Optimized Border Interdiction Jonathan L. Paynter

advertisement
Optimized Border Interdiction
by
Jonathan L. Paynter
B.S., Mathematics, United States Military Academy (2006)
Submitted to the Sloan School of Management
and
Engineering Systems Division
in partial fulllment of the requirements for the degrees of
Master of Science in Operations Research and Master of Science in Technology and
Policy
at the
MASSACHUSETTS INSTITUTE OF TECHNOLOGY
June 2014
c Jonathan L. Paynter. All rights reserved.
The author hereby grants to MIT and The Charles Stark Draper Laboratory, Inc.
permission to reproduce and to distribute publicly paper and electronic copies of this
thesis document in whole or in part in any medium now known or hereafter created.
Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sloan School of Management and Engineering Systems Division
May 9, 2014
Certied by. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Stephan E. Kolitz
Technical Sta, The Charles Stark Draper Laboratory
Thesis Supervisor
Certied by. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dimitris J. Bertsimas
Boeing Professor of Operations Research
Thesis Supervisor
Accepted by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dava Newman
Professor of Aeronautics and Astronautics and Engineering Systems
Director, Technology and Policy Program
Accepted by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Patrick Jaillet
Dugald C. Jackson Professor
Co-director, Operations Research Center
THIS PAGE INTENTIONALLY LEFT BLANK
Optimized Border Interdiction
by
Jonathan L. Paynter
Submitted to the Sloan School of Management
and
Engineering Systems Division
on May 9, 2014, in partial fulllment of the
requirements for the degrees of
Master of Science in Operations Research and Master of Science in Technology and Policy
Abstract
A feature of many conicts is the presence of a border that separates an area of on-going military
operations from an area that the enemy can use permissively. This thesis considers analytic
techniques for planning military operations designed to interdict enemy forces crossing the border.
Specically, this thesis presents optimization-based methods for scheduling patrolling units and for
positioning ground sensors in support of those patrolling units. These methods could serve as the
framework for a tactical-level decision support tool designed to assist military planners assigned to
border regions with resource allocation recommendations and trade-o comparisons. We propose
tractable mixed integer optimization formulations for these solutions based on a network model of
the routes in the region, operational constraints on the abilities of the patrolling units, and
estimates of enemy force movements. Additionally, we develop robust extensions to these
formulations that allow the model to account for a degree of enemy intelligence by incorporating
the uncertain nature of the enemy movement estimates into the formulation.
We evaluate the solutions to these formulations using simulations that account for dierent
realizations of the uncertain enemy movement. This includes cases where the realized enemy
movement closely matches the estimates made in the model and cases where the realizations are
very dierent from the model. Additionally, we provide a modied greedy heuristic to the
scheduling formulation that can serve as a tool for dynamically retasking a patrol to interdict
enemy forces in real-time after a sensor detects enemy movement. Current planning for these
operations are conducted by a sta with no decision making analytic tools. We approximate a
version of this current planning method with an algorithm and show that our method outperforms
it with both the deterministic and robust formulations. We compare the deterministic and robust
formulations and demonstrate a process for choosing between the formulations, along with an
explanation of the utility of the robust formulation.
Thesis Supervisor: Stephan E. Kolitz
Title: Technical Sta, The Charles Stark Draper Laboratory
Thesis Supervisor: Dimitris J. Bertsimas
Title: Boeing Professor of Operations Research
3
THIS PAGE INTENTIONALLY LEFT BLANK
Acknowledgments
This thesis would not have been possible without the ideas, advice, and help of many people
during the past two years.
I would like to thank my thesis and academic advisor, Dimitris Bertsimas, for his fantastic advice,
patient explanations, and condence in my ability to learn the necessary techniques to make this a
successful thesis. I would also like to thank my two thesis advisors at Draper, Stephen Kolitz and
John Irvine. Their ability to probe for the underlying ideas in the problem and emphasis on
realistic modeling was very helpful, and it ensured that the work in this thesis stayed true to the
motivating problem.
The opportunity to study at MIT would not have been possible without the Department of
Mathematical Sciences at the United States Military Academy, and I am grateful for their decision
to let me study at MIT and to bring me to West Point as a math instructor. My time spent
researching and writing was fun and enjoyable in part because of the outstanding support of MIT's
Operations Research Center and Draper Lab. I enjoyed working with some of the brightest people
in the world, and I am grateful to Dave Culver, Mark Williams, Nick Jernigan, and Louis Kim for
support during classwork and research.
The motivating experience for this thesis came from time spent deployed in southern Afghanistan,
and has its roots in operational work done by Don Nibblett, Josh Sutho, Talon Young, DJ Jones,
and the soldiers of Blackjack Troop, 2-38 CAV.
Most importantly, I owe the most to my wife - without her support, I would not have had the
opportunity to study at MIT. Her patience and dedication to our sons is what enabled me to
dedicate time to academic pursuits, and her willingness to move and support an army career is
what makes my job possible.
Jon Paynter, Captain, US Army May 9, 2014
This thesis was prepared at The Charles Stark Draper Laboratory, Inc. Publication of this thesis
does not constitute approval by Draper of the ndings herein. It is published for the exchange and
stimulation of ideas. As an active duty Army ocer, I am aware that the views, analyses, and
conclusions expressed in this document are mine and do not represent the ocial policy or position
of the United States Army, the Department of Defense, or the United States Government.
5
THIS PAGE INTENTIONALLY LEFT BLANK
Contents
1
2
3
Introduction
19
1.1
Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.2
Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.3
Thesis Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Background
25
2.1
Tactical Planning Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2
Generalized Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.4
Example Scenario - Operations in Afghanistan . . . . . . . . . . . . . . . . 29
2.5
Guards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.6
Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.6.1
Sensor Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.6.2
Border Sensor Use . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Problem Framework
3.1
37
Functional Decomposition . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.1.1
Base Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7
4
3.1.2
Base Process Plus Sensors and Data Analysis . . . . . . . . . . . . 39
3.1.3
Base Process Plus Sensors, Data Analysis, and Other ISR . . . . . . 41
3.1.4
Base Process Plus Sensors, Data Analysis, Other ISR, and Dynamic Retasking . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.1.5
Individual Functions . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.2
Example As-Is Operations . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.3
Functional Focus Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.4
Example Scenario - Revisited Analytically . . . . . . . . . . . . . . . . . . 47
Solution Approaches
51
4.1
Analytical Approach Overview . . . . . . . . . . . . . . . . . . . . . . . . 52
4.2
Model Taxonomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.3
Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.3.1
Network Interdiction Models . . . . . . . . . . . . . . . . . . . . . 54
4.3.2
Flow Capture Models . . . . . . . . . . . . . . . . . . . . . . . . . 56
4.3.3
Other Border Security Models . . . . . . . . . . . . . . . . . . . . 56
4.3.4
Related Models with Military Applications . . . . . . . . . . . . . 57
4.4
Model Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.5
Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.6
General Approach - Flow Capture . . . . . . . . . . . . . . . . . . . . . . 59
4.7
General Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.7.1
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.7.2
Friendly Forces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.7.3
Enemy Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
8
4.8
4.9
Basic Patrol Scheduling (B-PS) . . . . . . . . . . . . . . . . . . . . . . . . 65
4.8.1
B-PS Model Description . . . . . . . . . . . . . . . . . . . . . . . 65
4.8.2
B-PS Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.8.3
B-PS Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.8.4
B-PS Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Determine Sensor Placements (DSP) . . . . . . . . . . . . . . . . . . . . . 71
4.9.1
DSP Model Description . . . . . . . . . . . . . . . . . . . . . . . 75
4.9.2
DSP Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.9.3
DSP Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.9.4
DSP Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.10 Dynamic Guard Retasking (DR) . . . . . . . . . . . . . . . . . . . . . . . 82
4.10.1 DR Model Description . . . . . . . . . . . . . . . . . . . . . . . . 83
4.10.2 DR Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.10.3 DR Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
4.10.4 DR Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
4.11 Enhanced Patrol Scheduling (E-PS) . . . . . . . . . . . . . . . . . . . . . 85
4.11.1 E-PS Model Description . . . . . . . . . . . . . . . . . . . . . . . 86
4.11.2 E-PS Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.11.3 E-PS Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.11.4 E-PS Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.12 Mission Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.13 Summary of Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
9
5
6
A Robust Approach
95
5.1
Motivation and Background . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.2
Robust Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.3
Robust Sensor Placement (R-DSP) . . . . . . . . . . . . . . . . . . . . . . 97
5.3.1
Robust Formulation Derivation . . . . . . . . . . . . . . . . . . . . 98
5.3.2
Polyhedral Uncertainty Sets . . . . . . . . . . . . . . . . . . . . . 98
5.3.3
New Objective and Additional Constraints . . . . . . . . . . . . . . 101
5.3.4
R-DSP Formulation . . . . . . . . . . . . . . . . . . . . . . . . . 102
Results and Analysis
6.1
105
Test Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
6.1.1
Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
6.1.2
Data Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.2
Tractability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.3
Overall Results for the DSP Model . . . . . . . . . . . . . . . . . . . . . . 109
6.4
Robust Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.4.1
Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
6.4.2
Robust Experiment 1 . . . . . . . . . . . . . . . . . . . . . . . . . 114
6.4.3
Robust Experiment 2 . . . . . . . . . . . . . . . . . . . . . . . . . 116
6.4.4
Robust Experiment 3 . . . . . . . . . . . . . . . . . . . . . . . . . 116
6.4.5
Robust Experiment 4 . . . . . . . . . . . . . . . . . . . . . . . . . 117
6.4.6
Robust Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 119
10
7
Operational Evaluation
7.1
Test Scenarios - Real-world Parallels . . . . . . . . . . . . . . . . . . . . . 121
7.2
Operational Model Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 122
7.3
8
121
7.2.1
Staff Approximation Algorithm for Interdiction . . . . . . . . . . . 122
7.2.2
As-is v. Analytical Model Performance . . . . . . . . . . . . . . . 124
Guard and Sensor Placement Decisions . . . . . . . . . . . . . . . . . . . 125
7.3.1
Varying Levels of Sensors and Guards . . . . . . . . . . . . . . . . 126
7.3.2
Decisions for Different Levels of Robustness . . . . . . . . . . . . 126
Conclusion
129
8.1
Summary of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
8.2
Towards Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
8.3
8.2.1
Operational Implementation . . . . . . . . . . . . . . . . . . . . . 130
8.2.2
Adopting a Decision Support Tool . . . . . . . . . . . . . . . . . . 133
Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
A Abbreviations and Acronyms
137
11
12
List of Figures
2.4.1 An Example Scenario for Border Interdiction Operations: A combat brigade
conducting operations along a border and using limited patrolling capacity
(blue rectangles) to attempt to interdict enemy forces moving across the
border (red arrows). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.5.1 Possible Guard Configurations: Three possible elements of a guard. (From
top to bottom) A Bradley fighting vehicle in an overwatch position in northwestern Iraq (half of a guard unit); A three HMMWV platoon preparing for
an reconnaissance mission near Mosul, Iraq; A platoon of US and Afghan
soldiers moving to a new overwatch position near the Afghanistan / Pakistan border. Photos from author’s collection. . . . . . . . . . . . . . . . . 33
2.6.1 An Example of an UGS Camera - OmniSense cameras from an Unattended
Ground Sensor system made by McQ, Inc (This is an example of an available system, and not an endorsement of a particular sensor technology) . . 35
3.1.1 Functional Analysis Legend: Description of the different components used
in the Functional Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.1.2 Functional Diagram - Base Process: A description of the border interdiction planning and execution cycle currently in use . . . . . . . . . . . . . . 39
3.1.3 Functional Diagram - Base Process Plus Sensors and Data Analysis: The
border interdiction planning and execution cycle augmented by the emplacement of ground sensors . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.1.4 Function Diagram - Base Process Plus Sensors, Data Analysis, and Other
ISR: The border interdiction planning and execution cycle augmented by
the emplacement of ground sensors and incorporating the need to task outside ISR assets that occasionally support border interdiction operations . . . 41
13
3.1.5 Functional Diagram - Base Process Plus Sensors, Data Analysis, Other
ISR, and Dynamic Retasking: The border interdiction planning and execution cycle augmented by the emplacement of ground sensors, ISR asset
tasking, and accounting for the ability to cue patrols in real-time based on
sensor data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.2.1 Operational Diagram - As-is Border Interdiction Operations: A description of the system functions as they are currently executed by army units
assigned to border interdiction tasks; the functions above the dotted line
are typically not conducted, or if they are, conducted without an analytical
component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.3.1 Functional Diagram - Highlighted Focus Areas: Four functions in border
interdiction operations related to decision making that could benefit from
an analytic framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.4.1 An Improved, Example Scenario for Border Interdiction Operations: A
combat brigade conducting operations along a border and using an analytic
framework to improve limited patrolling capacity (blue rectangles) to interdict enemy elements (red arrows) by employing ground sensors (green
circles) and functional improvements to the planning process . . . . . . . . 48
4.1.1 Analytical Approach Diagram: The analytical improvements recommended
for the four critical, decision making functions in the border interdiction
system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.6.1 Flow Capture Scenario Example: A toy example of a situation where the
flow capture model can be used to solve for the optimal facility location
(blue rectangles) based on the flows (red arrows) in the network . . . . . . 60
4.7.1 Example Road Network: A simplified road network in a border region
where the ends of the roads in country A are modeled as origin nodes,
and the major roadway in the lower left is modeled as the destination node.
62
4.8.1 Placement of The “Patrol Scheduling” Function in the Border Interdiction
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.9.1 Placement of The “Determine Sensor Placement” Function in the Border
Interdiction System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
14
4.9.2 Sample Network 1: An illustration of employing sensors and a guard in
tandem to capture the optimal amount of enemy forces in a network with
limited connectivity. The guard (blue rectangle) can move either left or
right in response to a sensor (green circles) detection. . . . . . . . . . . . . 73
4.9.3 Sample Network 2: An illustration of employing sensors and a guard in
tandem to capture the optimal amount of enemy forces in a network with
moderate connectivity. The guard (blue rectangle) can move either left or
right in response to a sensor (green circles) detection. . . . . . . . . . . . . 74
4.9.4 Sample Network 3: Determining Sensor Placement and “Extended Reach”
- the guard (blue rectangle) has the ability to intercept enemy movement on
path 1 (through the sensors - green circles), but not path 2 or path 3 since
those flows do not travel through the sensor location and towards the guard
76
4.10.1Placement of The “Dynamic Guard Retasking” Function in the Border Interdiction System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
4.12.1Placement of The “Mission Feedback” Function in the Border Interdiction
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4.12.2Marginal Benefit of a Sensor: A sample graph of the utility of additional
sensors based on an updated assessment of the situation . . . . . . . . . . . 92
4.12.3Marginal Benefit of a Guard: A sample graph of the utility of additional
guards based on an updated assessment of the situation . . . . . . . . . . . 93
5.3.1 Nominal vs. Robust Flow Values: An example sketch of the difference
between solving for a single value (left) and for a range of possible values
(right), where the Ceiling parameter controls for the amount of gray area
considered in the solution . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
6.1.1 Test Scenario: A sketch of a representative border scenario with multiple
crossing points and roads connecting to a larger highway inside the country
of concern. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
6.1.2 Test Scenario as a Network: The network that we use for the initial testing
of our formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.2.1 Solution Times: The solution times for different combinations of guards
(lines) and sensors (x-axis) in seconds (y-axis) for the DSP model . . . . . 108
15
6.3.1 Marginal Utility of Sensors: The percent of flow captured for a fixed quantity of guards and different numbers of sensors . . . . . . . . . . . . . . . . 110
6.3.2 The Impact of Guards and Sensors: Percent captured for different combinations of guards and sensors as a way to compare tradeoffs . . . . . . . . 110
6.3.3 The Impact of Guard Speed: Percent captured for a fast and slow guard for
different numbers of sensors . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.4.1 Simulated Flow Constructs: Four different ways of simulating the uncertain flows as compared to the uncertainty set used in the formulation. The
gray intervals represent the uncertainty sets used for certain nominal values (black lines at the mid-point of the gray intervals). These base gray
intervals are the same for all four simulation constructs. The red intervals
represent the simulation interval used with random draws uniformly from
within the red interval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.4.2 Simulation Results for Varying Levels of Robustness: 2 guards, 4 sensors,
and a Zero-Anchored flow type under four different types of simulated flows 115
6.4.3 Simulation Results for Varying Levels of Robustness: 2 guards, 2 sensors,
and a Uniform Draw flow type under four different types of simulated flows 117
6.4.4 Simulation Results for Varying Levels of Robustness: 2 guards, 2 sensors,
and a Key Paths flow type under four different types of simulated flows . . 118
7.3.1 Optimal Guard and Sensor Locations: An illustration of the optimal locations for 2 guards and (top to bottom): 0 sensors, 1 sensor, 3 sensors and 5
sensors. The guards’ primary locations are in blue, the sensors are in green
and the guards’ base is in orange. . . . . . . . . . . . . . . . . . . . . . . 127
7.3.2 Optimal Guard and Sensor Locations for a Robust Solution: An illustration of the optimal locations for 2 guards and 4 sensors under the nominal
formulation, and the robust formulation (Γ = 2). The guards’ primary locations are in blue, the sensors are in green and the guards’ base is in orange. 128
16
List of Tables
4.2.1 Model Descriptions: A table summarizing the different models that we
present in this chapter, along with the differences in their use. . . . . . . . . 54
6.1.1 Flow Types: The different types of flows used in initially in the non-robust
simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.4.1 Robust Experiments: A summary of the different robust experiments conducted with flow type explanations found in table 6.4.2 . . . . . . . . . . . 112
6.4.2 Flow Types: The different types of flows used in simulations . . . . . . . . 112
6.4.3 Simulation Descriptions: The different types of realizations for the uncertain flows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
6.4.4 The Effect of Sensor Quantity on Robust Performance: Comparing percent
of enemy traffic captured for the MIP solution, nominal solution under simulation and robust solution under uncertainty . . . . . . . . . . . . . . . . 118
7.2.1 Nodal Uncertainty (N) Comparison: A comparison of the nodal uncertainty
metric, N, for 2 guards and various numbers of sensors with both the analytic staff algorithm (optimal), and the Determine Sensor Placements function124
7.2.2 Comparison of the DSP and R-DSP Models Under Simulation to the Staff
Approximation Algorithm: The percent of enemy flow captured for various
guard and sensor combinations under the nominal, robust and staff approximation methods with the margin of improvement of the best formulation
over the staff approximation . . . . . . . . . . . . . . . . . . . . . . . . . 125
17
8.1.1 Model Comparison: A table summarizing the different models that we presented in this thesis, sorted in terms of tractability from largest to smallest.
Analogous robust versions for E-PS and B-PS follow directly from our development of the R-DSP model. . . . . . . . . . . . . . . . . . . . . . . . 131
18
Chapter 1
Introduction
1.1
Motivation
With numerous worldwide threats, the United States military continues to operate in a
wide-range of areas performing a diverse set of tasks including counterinsurgency, counterterrorism, host nation support, and general security. These deployed forces include - as a
sample from the army - a large multi-division element in Afghanistan, a joint task force in
the Horn of Africa, small special operations teams in the Central African Republic, and a
division headquarters in Jordan adjacent to the Syrian civil war. To some degree in all of
these conflicts, enemy elements are able to use the borders between countries as a means
of accessing safer locations for refit and resupply. Because of this, United States army
elements of various sizes have an interest in monitoring and securing borders.
Securing the border between two countries is a difficult operation; borders can stretch for
hundreds of miles across varied terrain, creating a diverse set of challenges for any element
trying to control the area. Military operations along a border can include active intervention (example: the Iraq-Syria border from 2003 to 2010), host-nation support (example:
the Iraq-Syria border from 2010 to 2012 and the Afghanistan-Pakistan border from 2009 to
2014), and intelligence gathering activities (example: the Libya-Algeria border in 2011).
The military must take a resource constrained approach to applying assets along a border,
usually in the context of a much broader mission inside the country. For example, in Iraq,
even the units operating along the borders with Syria and Iran had population-centric counterinsurgency tasks in addition to border security tasks. These other missions, as well as
units with missions that had no border component further inside the country (such as in
19
Baghdad and Mosul), frequently had priority for Intelligence, Surveillance and Reconnaissance (ISR) assets, which relegated the border security mission to that of an economy of
force. Even so, good border security that limits the flow of lethal material and fighters can
lead to additional security gains for many different units operating inside a country. This
means that border security operations can have a magnified effect on the rest of the friendly
forces’ operations further inside the country.
The general category of border security encompasses a wide-variety of tasks including
active searching at authorized crossing points, the bureaucratic oversight of crossings, and
a method to limit or stop traffic at unauthorized crossing points. The searching at active
crossing points is manpower intensive and nested with the bureaucratic tasks related to
trade and immigration. These tasks are broadly classified as Port of Entry operations, and
this research does not address them.
The problem of limiting traffic at unauthorized crossing points, or interdiction, is frequently
one of deploying limited resources to focused areas across vast expanses of terrain. This
is not solely a mission for soldiers and patrols; many ISR assets can assist in determining
what infiltration routes exist and how frequently they are used. As the importance of securing a border increases without an increase in the number of forces available, the efficient
employment of soldiers and ISR sensors becomes even more important. A more coordinated approach to the specific employment of different sensors and units should increase
the overall effectiveness of interdicting enemy traffic at unauthorized crossing points along
a border.
Creating this refined approach to border interdiction relies initially on analyzing relevant,
quality input data. However, collecting data on general enemy activity is difficult, not only
at the point of detection, but also in quantifying the diverse array of possible detections.
One successful example of data-driven work from recent operations is the heat mapping
of Improvised Explosive Devices (IEDs). The military adopted a number of visualization
tools that could show historical patterns of IED strikes for use in focusing future operations.
These systems were not predictive in a truly analytical sense and did not provide recommended friendly force actions, but the descriptive statistics they provided allowed many
units to better employ ambush positions, task route clearance teams, and reroute supply
convoys. Most soldiers now are very familiar with terms such “Tier One IED Hot Spot”
(although the definitions may vary) from using these techniques.
The border security problem presents an opportunity where quantifiable data can not only
enhance the process of learning about the enemy, but provide a genuine recommendation
on the employment of friendly forces. Infiltration across a border is fundamentally about
20
enemy forces moving through an area; countering these efforts hinges on the ability of the
friendly forces to learn enemy patterns and frequently used routes in order to best position
interdiction patrols and overwatch elements.
Moreover, a data-driven approach related to the frequency and types of infiltrations across
a border could greatly assist the units that are tasked to secure the border. This possibility
leads to an interest in the employment of Unattended Ground Sensors (UGS) as a means of
collecting data on various infiltration routes along a border. These sensors come in a variety
of forms, but are characterized by their ability to transmit information – acoustic, seismic,
photographic – for a long period of time after they have been emplaced in a concealed
manner. A deliberate employment of these sensors could lead to refined intelligence about
infiltration routes. Additionally, a suite a properly arrayed sensors could greatly enhance
the effective range of a security patrol by providing an early warning cue about an enemy
infiltration.
Because the friendly forces’ set of actions is more limited than a general military scenario,
the border interdiction problem presents an opportunity where a decision support tool could
be created to assist friendly planners. This tool could leverage data collection on border
crossing activity and create recommended friendly force patrols and sensor locations. Because border security operations are usually conducted as an economy of force, it is even
more critical that smaller units with less support have additional tools to assist in the planning process.
In light of this possibility for a decision support tool, this research attempts to answer the
following questions:
R ESEARCH Q UESTION 1: How can we optimally employ sensors (UGS) along a border
to improve our understanding of the enemy and our border security operations?
R ESEARCH Q UESTION 2: How can we better allocate the soldiers assigned to border
interdiction based on an improved understanding of the enemy, and in concert with the
sensors?
1.2
Contributions
In this research, we provide a holistic look at the border interdiction process that military
units must conduct when their operations are near borders that provide the enemy access
to a permissive area for refit and resupply. We provide a functional decomposition of this
21
system, and highlight functional-level analytic improvements that could provide the basis for a tactical level decision support tool. We focus on the decision-making functions,
and develop four tractable models that could be used in the process for scheduling interdiction patrols, determining where to place ground sensors, dynamically retasking interdiction
patrols based on real-time sensor cues of enemy movement, and scheduling interdiction patrols in the presence of ground sensors. We also provide a robust extension the largest of
the models (a method which extends directly to the others), which is a tractable method for
including the uncertainty present in the estimation of enemy movement. This use of robust
optimization provides a method for incorporating a degree of enemy intelligence into the
formulation without resorting to less tractable game theoretic approaches. We demonstrate
why the robust approach is valuable, and outline the details of when it is useful, which is
primarily a function of the number of sensors present. These formulation provide improved
results over an algorithm that approximates the current staff planning process. Additionally, the method that we introduce for considering the locations of patrols and sensors in
tandem could extend to mobile sensors (such as a UAV), operating in conjunction with a
ground interdiction force.
1.3
Thesis Structure
In Chapter 2 we describe the problem in more detail and present an example scenario to
help illustrate the border interdiction process. Chapter 3 provides the functional decomposition of the border interdiction system so that the we can fully evaluate where analytic
approaches could best improve the process. Chapter 4 outlines the solution approaches to
the critical decision making functions that we address. This includes the introduction of
four models, including MIP formulations for scheduling patrols and determining sensor
placements, an algorithm for dynamically retasking a patrol when a sensor detects enemy
movement, and a overview of using the formulations to evaluate operational changes. In
Chapter 5 we present the robust optimization extension to one of the MIP formulations
along with an explanation of why we need to consider uncertainty, particularly for our
estimates of the enemy movements along the border. In Chapter 6 we present computational results. This includes a tractability analysis and an understanding of how varying
parameters affects the solution. In addition, we present a comparison of the deterministic
and robust formulations, along with an explanation of when the robust formulation outperforms the deterministic formulation. In Chapter 7 we present computational results geared
towards an operational understanding of the system. This includes a comparison of our
formulations with an algorithm that approximates the current planning process, and an un22
derstanding of the implementation of the solutions found from the formulations. Chapter 8
includes our closing remarks, comments on the operational implementation of the system,
and recommendations for future work.
23
24
Chapter 2
Background
In this chapter, we present background information relevant to the border interdiction system, and the development of our models. We first describe the need for tactical planning
tools in general, followed by an explanation about how our modeling work could expand
to other domains. We then define some key terminology and outline an example scenario.
Finally, we describe in detail the guards and sensors that are involved in the interdiction
process.
2.1
Tactical Planning Tools
US military forces continue to operate in numerous locations around the world, in a variety
of conflict types. As the number of conflicts involving smaller, distributed military units
increases, the importance of developing planning tools that can assist at the tactical level
also increases. The military has a strong history of using operations research methods
for improving at the operational level, especially with logistic coordination. Examples
include the founding work of operations research in world war two with radar placement
and convoy protection, along with more recent logistics examples such as the development
of the Northern Distribution Network to support operations in Afghanistan. There is less
of a track record at the small-unit, tactical level for using decision support tools to assist at
the warfighter level.
There are acknowledged efforts in the Department of Defense about this kind of work, but
less of it is focused on tactical decision recommendations. The equivalent role of Chief
Technology Officer in the Department of Defense is the Assistant Secretary of Defense for
25
Research and Engineering. This office has a number of initiatives, and supervises many of
the research efforts in the Defense Department. One of the office’s seven technology focus
areas is Data to Decisions. This research effort includes many of the intelligence products
that assist planning staffs. A tactical planning tool of the variety discussed here would add
more of a recommendation layer to some of these existing products.
Our focus on the importance of tactical decision support tools for planning is on a missionspecific tool, and not a technology specific tool. We think it is less useful to consider
an algorithm or formulation that assists in tasking a specific type of UAV, than it is be
to consider a tool that is designed to assist in planning certain types of operations, and
incorporates the ability to task a specific type of UAV. The distinction is important, because
it indicates an emphasis on a mission-set, and not an emphasis on a proprietary technology.
With more distributed operations, decision aids at the tactical level provide two very useful
features for military units. First, they provide leverage for a smaller staff to incorporate
and take advantage of larger amounts of intelligence. For intelligence synthesis, this type
of work saw a large improvement during the conflicts in Iraq and Afghanistan. Smaller
units, down to the company-level, began employing data aggregation and pattern analysis
tools with their own intelligence sections that allowed local commanders to leverage large
amounts of information. One of the most prominent was attack visualization, in particular the ability to use density plots and heat maps to understand where areas with large
concentrations of IED attacks were occurring.
While many of these tools were fantastic enablers for intelligence staffs, they were limited
to analysis and visualization, and did not incorporate mechanisms for recommendations on
friendly force actions. We can view the decision support tool as a two layer process where
the base layer is the data analysis and intelligence fusion. The second layer is then the
recommendation layer where the intelligence is processed, and the tool provides a recommendation on possible actions. This second layer does not exist for tactical applications,
and there are places where a computer-supported recommendation layer could provide a
benefit to the normal staff process. Not every military action is easily characterized into a
system built to recommend a course of action, and so one main barrier to the development
of a tactical decision support tool is identify a problem where quantification is useful without losing too much of the situational context. Additionally, the notion of a computer-based
recommendation for the employment of tactical formations has a number of negative connotations within the military. Many officers who would agree with the notion of analytic
tools for improving a supply chain or optimizing a UAV route would hesitate to adopt a
technology that gives the impression of commanders ceding control of tactical decisions.
26
This is valid concern, and any decision support tool designed for the tactical level must be
built and implemented as an aid for planning, and not as a substitute.
These tools are even more important in settings where the US military has a smaller footprint, for example US operations in 2013 in a number of African countries, and the presence
of a large planning staff is not possible.
We will discuss additional issues associated with the implementation of this tactical decision support tools specifically for border interdiction in section §8.2.
2.2
Generalized Problem
One area where a decision support tool could assist is with security operations along a
border. The need for border interdiction operations occurs in many types of conflict, as
demonstrated by the numerous recent locations where enemy forces used a border as a
means of accessing a safe location for resupply. The questions posed in section §1 present
an opportunity for improving interdiction operations, but at a more general level, the concept of gathering data from localized sensors in order to better allocate patrols describes
most situations that include a perimeter and a need for security. The solution methods described in this paper present one approach at decomposing the overall border interdiction
system into smaller functions, each with its own solution method. Some examples of other
variants of this problem include perimeter security at a large installation, domestic border
security, the protection of a military unit’s lines of communication, smuggling routes, and
a security zone for a defensive position. In each of these cases, the ability to sense enemy
movement, cue responding forces, and collect data to better inform a security posture are
applicable.
Specifically for military applications, the possible gains from a border interdiction decision
support tool are larger in situations where the military has not had a sizable presence. For
smaller units deploying into new border regions devoid of an operational history, the ability
to have an initial recommendation for force employment based on limited ISR analysis and
the first portion of a staff intelligence assessment is of great value.
Without losing sight of these other applications, we proceed throughout this paper with
a focus on the need for resource constrained military units to execute border interdiction
operations in support of a larger military operation. Specifically we consider cases from
the American conflicts in Iraq and Afghanistan as illustrative, and leverage knowledge
27
from personal experience conducting military operations in southern Afghanistan along
the Afghanistan / Pakistan border. We develop an example scenario that characterizes these
cases in an effort to further elaborate on the problem.
2.3
Definitions
Before we describe an example scenario to detail border interdiction operations, we define
some key terms that will be used throughout the paper.
Border Region: The area adjacent to an international border where military units operate
with the task of securing the border. This region includes all of the terrain where enemy
forces can be killed or captured before getting to an area where it is easy to disperse within
the country.
Friendly forces: United States and coalition forces operating in a border region. This includes all types of forces and units, not only those dedicated to border interdiction. The
planning headquarters responsible for border security is typically the senior friendly forces
headquarters in the region. The size of this headquarters can vary substantially from scenario to scenario and could be as small as a company headquarters (responsible for 100
soldiers) or as large joint task force headquarters (responsible for over 10,000 soldiers).
Guards: The subset of the friendly forces tasked to border interdiction operations. A guard
unit has no universally defined size, but is typically a squad or platoon, and is the smallest
element that the friendly forces headquarters uses as an independent element. Guard is not
the typical term used in the military for an element patrolling the border, but the term here
carries more applicable connotations for non-military readers and for other scenarios.
Sensors: Any technology used to detect movement at a given place along the border.
Enemy: The threat group that the friendly forces are attempting to kill or capture. This
includes all re-supply that is crossing the border. Most of the enemy units do not intend to
operate full-time along the border, but are moving through in an effort to affect operations
further inland from the border.
Paths: A route that the enemy could use to move from a refit area across the border, and
into the inland area of the country.
Infiltration: Enemy movement crossing the border. This is a subset of all possible enemy
actions and relates specifically to movement.
28
Interdiction: The process of actively stopping an enemy unit that is infiltrating across the
border. Usually initiated from a covert emplacement of soldiers.
2.4
Example Scenario - Operations in Afghanistan
Consider the following scenario as an illustrative example of one application of an analytical approach to borer interdiction operations (security operations not including Port of
Entry operations) that uses as context American experiences from the last 2009-2012 in
Afghanistan. We use this as the primary example, but acknowledge that many of the need
for border interdiction operations is not restricted to major US military engagements.
United States military forces in Afghanistan include numerous combat brigades, each consisting of approximately 4000 soldiers. Each brigade has an Area of Operations (AO) for its
mission that includes training Afghan security forces and counterinsurgency tasks. Some
of these brigades are deployed along the Afghanistan-Pakistan border and consequently
conduct some border interdiction operations in an effort to prevent insurgent personnel and
materiel from crossing into Afghanistan. As an example, one of these brigades deployed
along the border consists of three battalions (800 soldiers each) and supporting assets. This
brigade assigns each battalion an Area of Operations within the brigade AO where each
battalion has a headquarters and a number of subordinate elements that can conduct security patrols or other missions. In this example, two of the brigade’s subordinate battalions
have Areas of Operation (within the brigade’s) that include the border (first and second
battalions), while the third battalion operates further inland from the border. Because their
primary missions of developing the Afghan security forces in the area and conducting counterinsurgency tasks take most of the forces, each battalion has a maximum of two platoons
(20 soldiers each) to assign to border interdiction tasks on any day as a guard force.
In this area of the country, Pakistan does not have a large security presence along the border,
and consequently, enemy forces frequently use the Pakistani side of the border to rest and
refit. Additionally, the majority of the enemy’s external supplies originates in Pakistan.
The enemy transiting the border varies in composition and could be a convoy of trucks
with supplies and fighters, a single motorcycle with bomb-making material, or a single
enemy fighter on foot.
In Figure 2.4.1, the border is denoted by the black dashed line. Enemy units are denoted
with red diamonds, and their usual infiltration routes across the border (not necessarily
29
known to the friendly forces) are marked with red arrows. Friendly forces’ bases are denoted with blue ovals, which are the locations of the headquarters elements (HQ). Friendly
forces’ security patrols serving as guards (two available platoons for each of the two borderadjacent battalions) are denoted by blue rectangles. The self-imposed boundaries between
battalions (a command and control measure) are denoted with dashed blue lines. The subordinate units of the battalions that are not conducting border interdiction operations are
not displayed. The sketch is not scaled, but the border in this region could easily extend to
a hundred kilometers.
Figure 2.4.1: An Example Scenario for Border Interdiction Operations: A combat brigade
conducting operations along a border and using limited patrolling capacity (blue rectangles) to attempt to interdict enemy forces moving across the border (red arrows).
The overriding question in the scenario is: how should the brigade / battalions employ the
patrols dedicated to border interdiction?
The enemy infiltration routes might be completely unknown or only partially known to the
friendly forces. Additionally, there could be a variety of road and trail types that cross
the border with the usual infiltration routes representing a relatively small subset of these
possible paths. The terrain might be restrictive for some of the routes - a valley, and more
open for others - a desert. These factors complicate any approach used to allocate forces.
30
A typical approach that the brigade headquarters might take would be to task the subordinate battalions along the border, first and second, to conduct operations to secure the border
region. There might be a specific requirement on the frequency of these operations or the
size of the forces involved, but specifics would be left to the battalion headquarters. This
decentralization is a necessary step for effective command and control of the forces in the
area, but also naturally complicates any centralized effort at border security for the brigade.
Additionally, any specific intelligence about an intended enemy infiltration would be sent
to the battalions and a larger, more directed operation might occur at the direction of the
brigade headquarters. Each of the two battalions with responsibility for some of the border would then conduct some security operations, and hopefully would coordinate directly
or through the brigade headquarters. Some of these operations would leverage ISR assets
and refined knowledge from previous security patrols. The battalion headquarters would
schedule these patrols based on whatever knowledge they have on hand, and would track
previous operations in an effort to create a useful log of where border interdiction patrols
have historically gone, and with what results.
Additionally, any useful information, such as aerial imagery, collected by ISR assets in the
area would be accessible through a map-based data aggregator. Some of this information
would come from ISR requests submitted by the battalions. These requests would usually
be based on which areas had not had ISR coverage recently. Intelligence analysts could
access a series of icons on a map representing available information about the border, and
this information could hopefully provide some context for future mission planning. This
information might be accessible at one time, but would probably not be aggregated in any
comprehensive estimate about overall enemy activity on the border. As a general rule,
without further intelligence, the battalion headquarters would most likely allocate patrols
on a rotational basis across the possible routes so that most possible locations are visited
with equal likelihood.
In the event that the unit had access to sensors, the battalions might choose to use them to
enhance their knowledge of the border. In that case, the unit would most likely prioritize
locations that might yield information about unknown routes or information about the types
of traffic on known routes. If the sensors were emplaced, the resulting data would be
available to the analysts. Additionally, the battalions might attempt to route the detection
alerts from the sensors into an operations center. In the event that a sensor was triggered,
the officer on duty would retask units as he saw fit based on possible enemy movement.
The use of ground sensors in this manner, in the experiences of the author, is uncommon.
However, both battalion headquarters and the brigade headquarters have a multitude of
other responsibilities, and without directed intelligence about specific enemy infiltrations,
31
border interdiction patrols frequently seem wasteful when compared with other mission
requirements. The prevailing question is still: where does a headquarters send a patrol when
there is limited information across dozens of kilometers? Even considering this and the
difficulty of gaining reliable intelligence on infiltrations, the interdiction of enemy forces
and supplies can have a significant effect on all manner of counterinsurgency operations
further inland. Therefore, any attempt at answering our two research questions - the better
incorporation of sensors and an improved allocation of soldiers - could greatly enhance the
ability of the headquarters in this scenario to secure the border.
2.5
Guards
A significant aspect of this work deals with improvements in allocating guards to interdict
enemy forces in a border region. We use the term guards as a catch-all for a variety of
possible military patrolling elements. The one requirement we place on a guard is that the
friendly forces headquarters unit allows it to operate independently.
The most common guard in the context of our example scenario would be a platoon of
soldiers, usually around 20, and if motorized, operating in three or four vehicles. This unit
size approximates the most typical US military units that operated independently in Iraq
and Afghanistan. Another possibility for a guard would be an armored vehicle section,
consisting of two tanks or Bradley fighting vehicles with 8 to 12 soldiers. This configuration was also used extensively in Iraq both for patrols and for overwatch positions of
the type considered here. This two vehicles section was allowed to operate independently
with less forces because of the increased protection afforded by a larger, armored vehicle.
Some terrain types limit vehicular elements, and the term guard could refer to a purely
dismounted element as well. Dismounted elements typically start at 9 soldiers, the basic
infantry squad in the US military, but occasional smaller scout elements could also be used.
Three variants of these guard types are depicted in Figure 2.5.1.
The most typical task associated with interdiction for a patrolling element is the emplacement of an observation post (OP) with a mobile, interdiction element from the same unit
located nearby. An OP is a small team of soldiers emplaced in an overwatch area, typically
covertly, who have the ability to conduct surveillance of a certain location. A mobile interdiction unit might be a squad of soldiers or a section (two) of vehicles that are located
32
Figure 2.5.1: Possible Guard Configurations: Three possible elements of a guard. (From
top to bottom) A Bradley fighting vehicle in an overwatch position in northwestern Iraq
(half of a guard unit); A three HMMWV platoon preparing for an reconnaissance mission
near Mosul, Iraq; A platoon of US and Afghan soldiers moving to a new overwatch position
near the Afghanistan / Pakistan border. Photos from author’s collection.
33
in a position to physically move into the path of probable enemy movement. A typical
mission for a guard unit assigned to interdict enemy forces in a certain area might look like
the following. A platoon receives the task to conduct interdiction operations of a certain
geographic area, usually specified as a Named Area of Interest (a designated location). The
platoon moves motorized towards the designated interdiction area and splits into two elements. The OP element moves on foot to a pre-planned overwatch site that gives them the
ability to surveil the NAI. The remaining portion of the platoon locates in an area near the
NAI where they can respond to any enemy forces identified by the OP.
The specifics of the platoon’s (guard unit’s) actions are generally left to the platoon leader
to plan. The higher headquarters generally plans the interdiction location (the NAI), and
leaves the execution details to the platoon.
This research could also extend guards as an aerial platform. We do not explicitly consider
it here, but this extension could easily take one of three forms. First, it could account
for a dismounted squad of soldiers that are helicopter-borne, and consequently much more
mobile. It could also account for helicopters used in a reconnaissance role. The army
frequently uses pairs of OH-58D helicopters in an aerial reconnaissance role, and will
continue the mission with AH-64D helicopters as the OH-58D phase out of service. Finally,
the research could extend to consider Unmanned Aerial Vehicles (UAVs) as guards. In this
configuration, the friendly forces would be using a UAV as a guard to interdict enemy
forces crossing a border and for possibly cueing additional forces.
2.6
Sensors
A portion of this work deals with improvements in security from friendly forces incorporating sensors in a more effective manner. The military has a wide variety of sensors available
for use, including an array of possible ground sensors.
2.6.1
Sensor Basics
The army fielded a number of UGS types during the Iraq and Afghanistan wars. Prominent
among these were the Falcon Watch system from the Harris Corporation, the Scorpion
from Northrup Grumman, and the OmniSense from McQ, Inc. These systems were used in
a number of roles, and featured the use of electro-optical and infrared cameras to capture
34
Figure 2.6.1: An Example of an UGS Camera - OmniSense cameras from an Unattended
Ground Sensor system made by McQ, Inc (This is an example of an available system, and
not an endorsement of a particular sensor technology)
images of an area after detection by a passive infrared or seismic sensor. The systems
consist of a number of components, namely a camera, some type of intrusion detection,
and a communications station that relays information back to forces, usually over a radio
frequency or satellite connection. An OmniSense camera is shown in Figure 2.6.1.
Currently, these systems are in the legacy category for procurement, as additional contracts
for development as well as Processing, Exploitation, and Dissemination (PED) have been
suspended. There are, however, a number of systems still in the army inventory. The UGS
program with current funding is called the “Expendable Unattended Ground Sensor” (EUGS) program, which is designed to provide some of the same intrusion detection capabilities but without a camera component. This program highlights their use for force protection
around a base, as well as the ability to network with other ISR sensors. The majority of
sensor use in Afghanistan has been this style of localized force protection emplaced by
units operating out of exposed outposts Shactman (2012). Even with this outpost security
focus, the E-UGS technology could be utilized in a border interdiction role. The E-UGS, if
linked to other ISR platforms or a central operating node could provide information about
enemy infiltrations along border crossing routes.
2.6.2
Border Sensor Use
Some military units deployed on a border have used UGS in an effort to gain knowledge
about different regions. However, the use has been intermittent at best, and to our knowledge, not of the scope and central purpose necessary for larger tactical gains. However,
sensors are frequently used along the United States - Mexico border as part of the Department of Homeland Security’s efforts to limit illegal crossings. These systems, because of
their dedicated use, are used in a more deliberate manner than some of the military applications. They include the goal of dynamically moving border police patrols to investigate
detections when the sensors are triggered. To our knowledge, there is not a comprehensive
35
look at leveraging sensor data and analytic techniques to improve patrol routes and sensor
locations.
Some of the UGS systems deployed on the US-Mexico border have been components of
larger systems involving mobile camera towers and fixed site sensor suites. The US government has recently been attempting to dramatically expand the number of sensors deployed
along the border. While some of the improved systems were delayed in 2013 because of
bandwidth issues, the overall concept - using UGS to trigger manned border police patrols
- remains strong Beckhusen (2013). The use of UGS by border protection services is not
limited to the US government. India recently expressed interest in installing a series of
UGS along its border with Pakistan Pandey (2012). These border security emplacements
by domestic police elements lend credence the idea of leveraging UGS in a military context
along a border.
36
Chapter 3
Problem Framework
Border interdiction operations are complex, and involve a variety of different participants,
plans, and operations. These include headquarters staff and patrolling units (guards), plans
for sensor emplacements and patrols, and mission execution. Before we develop any specific analytic techniques, we need to conduct an assessment of the different steps in the process. This will ensure that we create analytical solutions that fit into the currently executed
process without a drastic overhaul. Additionally, while we focus primarily on solutions for
the decision recommendation portion of the decision support tool, a holistic look at the entire process will better enable us to understand where the improvements fit into the overall
system. To conduct this assessment, we conduct a functional analysis of the overall border
interdiction process.
This chapter first describes are functional breakdown of the border interdiction system, and
then defines each of the functions involved in the process. We then use this functional
decomposition to show the current, as-is interdiction process. Finally, we illustrate the
areas of decision making that could benefit the most from an analytical approach, and then
describe the example scenario in terms of the analytically improved functions.
3.1
Functional Decomposition
The sub-steps involved in this problem – all the different components of border interdiction
activities – can be viewed as a system composed of various functions, with information
passing between the functions. The purpose of section §3 is to highlight this functional
structure in an effort to identify areas where improvements can enhance the effectiveness
37
of the units assigned to border interdiction missions and where we can create an analytical
process to answer our research questions. Additionally, the functional decomposition helps
present a clearer picture of the system by breaking down the tasks and connections between
those tasks that exist in border interdiction operations. The incorporation of data-driven
sensor use and dynamic retasking, outlined below, represent new steps for improving the
use of information collected along a border in an effort to enhance border security.
Figure 3.1.1: Functional Analysis Legend: Description of the different components used
in the Functional Diagrams
To present this functional analysis, we begin with the base process that describes the bulk
of military operations in a simple closed-loop fashion. We then sequentially add different
steps from the border interdiction system until we fully capture the functional processes
occurring in the system. To more accurately develop the functional analysis diagrams,
Figure 3.1.1 displays a legend that is used for the remaining functional diagrams. In the
diagrams, functions are displayed as rectangles. The green functions represent current military operations. The red function represents the current enemy operations. Blue functions
represent decision making functions designed to enhance on-going operations. The orange
function represents a guard analysis function related to enemy activities. The light blue
functions are estimation and data analysis tools. The gray circles represent exogenous systems that can have inputs into the border interdiction system. Arrows denote the products
and information that flow between functions.
3.1.1
Base Process
The initial functional decomposition of this system applies generally to most military operations. For this case, in Figure 3.1.2, the specific inputs and outputs relate to the border
interdiction mission. It is a functional representation of the normally executed patrol planning cycle that the military implements regularly, at various tactical levels.
The system begins with the initial intelligence available, and over time it can accept exogenous intelligence inputs. The intelligence staff conducts “Enemy Analysis”, which then
38
Figure 3.1.2: Functional Diagram - Base Process: A description of the border interdiction
planning and execution cycle currently in use
provides an evaluation of the enemy and terrain to the “Patrol Scheduling” function. This
function, typically executed by a planning staff, creates a patrol schedule, and units assigned to guard tasks execute missions based on that schedule. This schedule is typically
focused on identifying the time and place (NAI) for interdiction operations. These missions
impact the enemy in one of three ways: no effect, the guards capture enemy forces, or the
enemy forces observe the friendly actions and do something different from their original
plan. These results, along with debriefs from the guard units are evaluated. These evaluations and debriefs update the “Enemy Analysis” and the “Patrol Scheduling” functions to
further improve the process.
The Base Process represents operations as the currently exist. The actual implementation
of any of the above functions varies widely between units and missions, but this closed
loop process with the ability to receive new, exogenous, intelligence is the building block
for all systems that involve deliberately planned military operations. This is the process
used in the example scenario for the brigade operating along a border where the battalion
headquarters conducted the “Enemy Analysis” and “Patrol Scheduling” and any new ISR
information entered the system as new intelligence. The log of patrol activities and mission
debriefs were the main tools used in refining future missions.
3.1.2
Base Process Plus Sensors and Data Analysis
One goal of this thesis is to answer – R ESEARCH Q UESTION 1: How can we optimally
employ sensors (UGS) along a border to improve our understanding of the enemy and our
border security operations? To answer this, we can add additional functions to the base
process. In this case, in Figure 3.1.3, sensors represent the use of Unattended Ground
39
Sensors (UGS), but the framework could apply to additional types of internal ISR assets
used in a deliberate manner for gathering information about enemy border infiltrations.
Figure 3.1.3: Functional Diagram - Base Process Plus Sensors and Data Analysis: The
border interdiction planning and execution cycle augmented by the emplacement of ground
sensors
In this update, the base process continues to operate normally. However, we add functions to enhance the “Enemy Analysis”. First, the “Enemy Analysis” function provides an
infiltration specific evaluation to a function that determines the sensor placements. This
function provides recommendations to the friendly forces on the optimal sensor locations
based on the resources available. Once the sensors are emplaced, the operational sensors
detect enemy movement (on some portion of the border). These sensor detections, along
with the sensor locations, then feed the “Analysis of Sensor Data” function that provides
updated intelligence on enemy infiltration to the overall enemy analysis.
The use of ground sensors for military border security is not a new idea, but the analytic
framework here that uses the sensors deliberately to estimate enemy activity through the
“Analysis of Sensor Data” is a new construct.
40
3.1.3
Base Process Plus Sensors, Data Analysis, and Other ISR
One additional improvement to this process is the ability to incorporate other types of sensor detections. These detections will primarily come from assets not organic to the friendly
forces unit responsible for border security. Consequently, we need to learn what locations
need additional collection, and then generate prioritized Intelligence, Surveillance, and Reconnaissance (ISR) requests for those locations. These requests will then be sent to the
higher headquarters in an effort to get additional ISR coverage. ISR coverage could come
from a variety of aerial platforms (manned or unmanned) that include sensors such as radar
and electro-optical. To successfully submit these requests, we need a method to prioritize
a list for where to gather additional information.
Figure 3.1.4: Function Diagram - Base Process Plus Sensors, Data Analysis, and Other
ISR: The border interdiction planning and execution cycle augmented by the emplacement
of ground sensors and incorporating the need to task outside ISR assets that occasionally
support border interdiction operations
This requires the addition of the “Determine Collection Requirements” function, as in Figure 3.1.4, which receives information gaps from the “Analysis of Sensor Data” function
and produces a prioritized list of ISR requests. This results in some additional ISR coverage, such as full motion video from an unmanned aerial vehicle (UAV) or radar coverage.
These new detections are then incorporated with the UGS detections in the “Analysis of
41
Sensor Data” function. ISR assets are widely employed in current border interdiction operations. The intent of these additional functions is to analytically refine the desired locations
for additional information and to provide a method for quantitatively including any new
ISR-provided detections.
3.1.4
Base Process Plus Sensors, Data Analysis, Other ISR, and Dynamic Retasking
The above process has the ability to provide much better intelligence for border interdiction
operations. However, the increased information about enemy actions provides updates only
to the planning process. An additional function is needed to provide real-time adjustments
to guard missions in an effort to immediately interdict enemy forces that have just been
detected. This dynamic retasking process, shown in Figure 3.1.5, and similar to crosscueing between intelligence assets, could greatly increase the utility of emplaced sensors
by integrating their detections with real-time execution.
Figure 3.1.5: Functional Diagram - Base Process Plus Sensors, Data Analysis, Other ISR,
and Dynamic Retasking: The border interdiction planning and execution cycle augmented
by the emplacement of ground sensors, ISR asset tasking, and accounting for the ability to
cue patrols in real-time based on sensor data
42
We therefore add the “Dynamic Retasking” function which uses all previous inputs and
also receives real-time updates on the current statuses of various units. This function can
then provide a real-time retasking to a guard unit (or other friendly forces unit operating in
the area) in an effort to position a force for interdiction.
Once this dynamic retasking function exists, the patrol scheduling function can improve. If
guards can react in real-time to sensor detections, then this ability needs to be incorporated
into the scheduling. For example, prior to the addition of the dynamic retasking function
the optimal guard location might be at a position that also has a sensor. Because guards
and sensors have different purposes - interdict versus gather information - this could still
be optimal. However, if the guard can respond to what the sensor detects, then the new
optimal location for the guards might be further inland where they can respond to possible
detections from the sensor at the old optimal location and additionally interdict the enemy
at a different location. This extends the reach of the interdiction force.
3.1.5
Individual Functions
F UNCTION : E XECUTION OF C URRENT M ISSIONS
The “Execution of Current Missions” function represents the operations that guard units
are executing at the current time. The inputs for this function are the current guard taskings
received from the “Patrol Scheduling” function and any updated tasks from the “Dynamic
Retasking” function. Any possible number of guard units could be executing a border interdiction mission. In our example scenario, this would include a maximum of the four
platoons assigned to border interdiction. This function also accounts for non-border security missions that are happening at the current time in the border region. The outputs of
the function are the most abstract, in terms of measurement, but vital part of the system.
They are the impact of interdiction operations on enemy units attempting to infiltrate the
border. Possibilities include having no effect, capturing enemy forces, or forcing the enemy
to change future plans.
F UNCTION : O PERATIONAL S ENSORS
The “Operational Sensors” function represents active sensors that friendly forces have emplaced. The inputs to this function are recommended sensor locations, which are realized
upon emplacement, and enemy movement. This function is what allows friendly forces to
gather data about the enemy movement through whatever sensor capabilities are present:
43
seismic, acoustic, or photographic. The outputs of this function are the sensor detections
that serve as the basis for data collection.
F UNCTION : OTHER O PERATIONAL ISR
The “Other Operational ISR” function represents active intelligence collection conducted
for friendly forces by assets outside of their immediate control. These include UAVs controlled by higher headquarters, and other types of airborne ISR platforms.
F UNCTION : C URRENT E NEMY ACTIONS
The “Current Enemy Actions” function encompasses all enemy movement currently occurring in the border area. The inputs to this function are unknown in our current system – they
include whatever inputs and information the enemy uses to decide on a course of action.
The outputs of this function, only some of which are visible, include any interactions with
friendly forces and detections by the sensors.
F UNCTION : E NEMY A NALYSIS
The “Enemy Analysis” function includes all steps that the friendly forces take to evaluate
and understand the enemy operating in the area. This includes the enemy composition
and activities as well as the terrain in the region. This function is the main location for
exogenous inputs, as any new intelligence gathered external to the system is incorporated in
this function. Outputs from this function include the enemy and terrain evaluations as well
as the infiltration evaluation, which is the subset of the evaluation specifically concerned
with movement across the border. The “Analysis of Sensor Data” function serves as the
quantitative counterpart to this function.
F UNCTION : PATROL S CHEDULING
The “Patrol Scheduling” function includes all steps that friendly forces take to plan for
future operations, out to some time horizon. This function receives the enemy and terrain
evaluations as an input, as well as any metrics on prior patrol performance. Any constraints
on guard operations such as the maximum patrol duration are applied in this function. The
output is the patrol schedule from the current time to the planned horizon, which consists
of tasks to guard units for all of those periods. Once the dynamic retasking function exists,
this scheduling function must also incorporate the ability for patrols to adjust in real-time
to detections.
F UNCTION : M ISSION F EEDBACK
44
The “Mission Feedback” function provides feedback on the results of the operations to
provide a closed loop framework to the process. The inputs are the mission results and
patrol debriefs, which provide updates to the enemy analysis and to the patrol scheduling
functions. This function allows the friendly forces to learn from the operations they plan
and conduct.
F UNCTION : D ETERMINE S ENSOR P LACEMENTS
The “Determine Sensor Placements” function takes the current infiltration evaluation and
the available sensors and provides recommendations on the most useful places that the
sensors can be placed along the border. This is an infrequently used function because of
the high cost in time and risk for a unit to move an already emplaced sensor. It is needed
when additional sensors are provided to the system, such as when a higher headquarters
allocates more sensors to the friendly forces.
F UNCTION : A NALYSIS OF S ENSOR DATA
The “Analysis of Sensor Data” function receives the sensor locations and detections and
aggregates them for qualitative evaluation as well as applying analytics to help update the
enemy analysis function with quantitative insights about enemy traffic crossing the border.
This function is the central processor for transforming sensor detections into intelligence
on enemy infiltration patterns.
F UNCTION : D ETERMINE C OLLECTION R EQUIREMENTS
The “Determine Collection Requirements” function prioritizes the locations where additional information on enemy infiltrations is needed. This produces a list of requested ISR
locations, which if collected on, result in additional detections that can be incorporated into
the “Analysis of Sensor Data” function. This relates to assets that are controlled by a higher
headquarters, and are not organic to the friendly forces.
F UNCTION : DYNAMIC R ETASKING
The “Dynamic Retasking” function is the real-time planning update that provides the ability
to retask a currently operating unit in an effort to interdict enemy forces that have just been
detected by a sensor. This function receives all previous inputs as well as the locations
of any other friendly forces available for retasking but not executing a guard mission. It
operates concurrently with whatever Common Operating Picture the friendly forces unit
uses to maintain awareness of what is happening in the area of operations.
45
3.2
Example As-Is Operations
Based on this functional decomposition, we can now revisit the example operations from
Afghanistan previously described with the example scenario and evaluate how each of the
functions are currently executed. The operational diagram in Figure 3.2.1 includes descriptions of the functions involved in the border interdiction process as they are currently
executed by most army units. Different units might execute some functions with slight
modifications, but the overall approaches remain the same.
Figure 3.2.1: Operational Diagram - As-is Border Interdiction Operations: A description
of the system functions as they are currently executed by army units assigned to border
interdiction tasks; the functions above the dotted line are typically not conducted, or if they
are, conducted without an analytical component
Of note, most of the functions above the dotted line that denote additions to the base process
are either not executed, as in the deliberate emplacement of ground sensors, or they are
executed without an analytical component. These current approaches show the opportunity
for analytical augmentation to some of the functions that would enhance the overall system.
46
3.3
Functional Focus Areas
Based on the functional decomposition and operational diagram, we now frame our problem in the context of the need to improve the functions listed above. For this thesis, we
focus on the three decision support functions that involve locally controlled assets: “Patrol
Scheduling”, “Determine Sensor Placements”, and “Dynamic Retasking”. Additionally,
we outline some techniques for the “Mission Feedback” function as a way of improving
guard and sensor allocation. We leave the the “Determine Collection Requirements” for
future research since it involves assets outside the main friendly forces’ unit. Also, we
leave the data evaluation function, “Analysis of Sensor Data” for further research since it is
based more on networking information and data analysis as opposed to decision support.
Figure 3.3.1: Functional Diagram - Highlighted Focus Areas: Four functions in border interdiction operations related to decision making that could benefit from an analytic framework
3.4
Example Scenario - Revisited Analytically
We can now revisit our previous example scenario in the context of the highlighted functions above. Instead of limited security patrols based on whatever knowledge is at hand,
47
the brigade and battalion headquarters can take a more systematic approach to the problem.
First, they attempt to leverage the data collection possibilities by employing ground sensors
(green circles) in a deliberate manner using the “Determine Sensor Placements” function.
Over time, the data that these sensors collect enhances the unit’s normal enemy analysis
with outputs from the “Analysis of Sensor Data” function. These outputs are used as an analytical addition for the “Enemy Analysis” function. Additionally, intelligence collection
requests are improved with the “Determine Collection Requirements” which prioritizes the
locations for other ISR needs.
Figure 3.4.1: An Improved, Example Scenario for Border Interdiction Operations: A combat brigade conducting operations along a border and using an analytic framework to improve limited patrolling capacity (blue rectangles) to interdict enemy elements (red arrows)
by employing ground sensors (green circles) and functional improvements to the planning
process
This improved intelligence is incorporated into a more intelligent “Patrol Scheduling” function which includes any additional requirements and limitations that the commander may
have. This improved function uses previously detected infiltrations on certain routes and
the absence of detections on other routes to optimize patrolling locations. In real-time when
a sensor detects a target, the headquarters can leverage the “Dynamic Retasking” function
to develop a set of immediate courses of action. Finally, over time, the headquarters can
48
leverage the “Mission Feedback” function to improve the feedback from executed operations to enemy analysis and planning. This scenario is just one example - the terrain,
number and size of units, available assets and a host of other factors could vary between
scenarios, but the functions involved are the same.
The remainder of this thesis develops specific solution approaches to selected functions
from this process.
49
50
Chapter 4
Solution Approaches
In this chapter, we develop our solution approaches to the four critical decision support
functions previously identified - “Patrol Scheduling”, “Determine Sensor Placements”,
“Dynamic Retasking” and simulation methods for “Mission Feedback”. We sequence the
chapter based on the functional buildup of the border interdiction system from base process
to a process that includes ground sensors and the ability to dynamically retask guard forces.
Additionally, we present a taxonomy of the various models that we formulate to highlight
their similar structure, and discuss their differences.
We first describe the approaches that we used to address the various functions in the context of the entire border interdiction system, and this serves as the sequence for the detailed
descriptions in the remainder of the chapter. We then conduct a literature review of the
relevant work, followed by a justification on model selection, and a discussion of the assumptions that we make. As we introduce the specific model formulations, we start by
discussing the basic construct that we adopt, followed by a detailed discussion of the necessary inputs. We then discuss a formulation for the basic “Patrol Scheduling” function
that could be implemented without sensors, followed by an expanded formulation that addressed the “Determine Sensor Placement” function. Next, we address a heuristic that
serves as the basis for the “Dynamic Retasking” function, followed by an enhanced version
of the “Patrol Scheduling” function that includes the ability to respond to sensor cues. Finally, we briefly discuss using the models to evaluate choices for the “Mission Feedback”
function, and close with a model comparison.
51
4.1
Analytical Approach Overview
There are many valid solution approaches to the four functions identified in section 3.3. We
identify here the our selected approaches, with a detailed justification later in the chapter,
and highlight the linkage of the functions and their respective models in the context of the
border interdiction system.
Figure 4.1.1 outlines our analytical approaches to each of the functions using the graphic
developed in Figure 3.1.5. We proceed to outline the different functions and the specific
solution approaches using the same sequential approach used in section 3.1 to develop the
full functional decomposition of the system.
Before beginning with the base process, we need to formalize the general inputs into system - our ability to capture the necessary information about the terrain, friendly forces and
enemy forces. Initially, we describe a simplified version of the “Patrol Scheduling” function, formulated as a Mixed Integer Program (MIP), since this forms the crux of the base
process in the border interdiction system, and all security patrols and tasks tie back into the
outputs of this function (as seen in Figure 3.1.2). We then describe the inputs in the context
of the MIP formulation.
Next, we focus on using sensors for data analysis. To do this, we work to improve the
key input to the “Patrol Scheduling” formulation - enemy traffic flows - which are the
quantitative estimates of future enemy infiltrations. We describe the decision support tool
for locating the sensors with a MIP formulation for the “Determine Sensor Placements”
function. This completes the first level of improvement to the system for the decision
support tools (as seen in Figure 3.1.3).
As described previously, in this thesis we omit discussion of the “Determine Collection
Requirements” function that allows us to incorporate external collection assets into our
analysis and the “Analysis of Sensor Data” function that provides the information updating
mechanism for the system. These functions complete the next level of improvement to the
system (as seen in Figure 3.1.4).
After this, we outline the “Dynamic Retasking” function as an algorithm which allows
for an immediate attempt at interdiction after a sensor detection. Once this ability is incorporated, we can improve the “Patrol Scheduling” function MIP since the tasked guard
locations should account for the fact that the guards can adjust to real-time detections (as
seen in Figure 3.1.5).
52
Finally, after revisiting and creating the enhanced “Patrol Scheduling” function, we outline
one aspect of the “Mission Feedback” function that uses simulation to evaluate the utility
of additional friendly force assets.
Figure 4.1.1: Analytical Approach Diagram: The analytical improvements recommended
for the four critical, decision making functions in the border interdiction system
4.2
Model Taxonomy
From a modeling standpoint, we present four different, but related models for implementation. These are the Basic Patrol Scheduling (B-PS) MIP, the Determine Sensor Placements
(DSP) MIP, and the Dynamic Retasking (DR) algorithm, and the Enhanced Patrol Scheduling (E-PS) MIP. In this chapter, we initially describe the flow capture construct, and then
outline a Basic Patrol Scheduling (B-PS) MIP that does not include the ability to incorporate sensor information. We then outline the DSP MIP that includes decision variables
for both scheduling and sensor placement. Then we describe the DR algorithm, which is
a greedy heuristic for the B-PS MIP. Finally, we formally describe the E-PS MIP which
incorporates knowledge of sensor location into the scheduling decisions, but works only
once the DR algorithm is implemented. We illustrate uses of the models for decisions in
53
the “Mission Feedback” function. A description of the different models can be found in
table 4.2.1.
Name
B-PS
Model Description
Basic Patrol
Scheduling MIP
DSP
Determine Sensor
Placement MIP
DR
Dynamic Retasking
Algorithm
E-PS
Enhanced Patrol
Scheduling MIP
Need
“Patrol Scheduling”
in the absence of
sensors
“Determine Sensor
Placements” to
enable sensor
detections into
patrol scheduling
decisions
“Dynamic
Retasking” function
to enable a real-time
guard response to
sensor detections
“Patrol Scheduling”
function that
accounts for the
presence of sensors
Decisions
Guard locations
over time
Guard locations
over time and sensor
locations
Feasible guard
location with
highest likelihood of
intercepting
detected enemy
movement
Guard locations
over time (after
sensors are
emplaced)
Table 4.2.1: Model Descriptions: A table summarizing the different models that we present
in this chapter, along with the differences in their use.
4.3
Literature Review
This section describes some of the previous work related to border interdiction, facility
location in a network, sensor use for border security, and other applicable military models.
We consider the previous work related to two different classes of problems involving traffic
in a network.
4.3.1
Network Interdiction Models
The most frequently researched class of problems related to resource allocation with border
security is known as network interdiction. In this class of problems, the research question
is determining the most important arcs in a network on which to employ resources, and the
54
most common solution methods for this class of problems are linear and nonlinear programming. Network interdiction studies began in earnest during the Vietnam War as a means
of modeling enemy lines of communication and supply lines. Work started on identifying
the most vital arc in a network in an effort to understand the optimal location for interdiction assets or bombing (Wollmer, 1964). Two common solution methods that tie into
other network problems are minimizing the maximum flow (Wood, 1993) and maximizing
the shortest path (Israeli and Wood, 2002) where arcs are disrupted to make the use of the
network more complicated for an enemy force. This relates to supply lines as a means of
modeling the most effective ways to impede enemy supplies and logistics, with the goal
minimizing the total amount of supplies that the enemy can send through the network, or
making the supply route longer.
These network interdiction models can apply outside military contexts with drug interdiction (Wood, 1993), information security in a communications network, and the smuggling
of nuclear material (Pan et al., 2003). Most of these constructs are designed with a game
theoretic approach, with the defender and attacker (or interdictor and infiltrator) portrayed
as rationally intelligent. This game theoretic construct is selected because of the ability to
incorporate enemy intelligence, but greatly complicates the tractability of more complex
models.
Two different game theory approaches are used as part of the two player zero-sum approach to network interdiction. The first approach is sequential moves. If we consider
a situation where someone is attacking enemy supply lines, then the attacker moves first,
and then the defender (or supply line operator) then moves to operate his degraded network as efficiently as possible (Wood, 2010). The second approach is simultaneous play.
Consider a network with an infiltrator attempting to cross through and an interdictor trying to stop him. If they both attempt to complete their actions at the same time, then they
both move with knowledge of how the other can act, but without knowledge of the specific
choices made (Washburn and Wood, 1994). In the context of an infiltrator, each arc has a
known probability of capture before resources are employed on it and afterward resources
are employed. Each player then makes the optimal choice for minimizing (infiltrator) or
maximizing (interdictor) the probability of capture. This model can extend to border security with multiple types of interdictors. Sequential play can also extend to border security
but is more suited for a specific high-level smuggling attempt – the interdictors setup their
defenses and then the smuggler makes a decision about where to go (Pulat, 2005). Pulat’s
work also incorporates the possibility of placing sensors that can work in tandem with a
capturing element.
55
4.3.2
Flow Capture Models
Another class of model that relates to traffic in a network is the flow capture model. Flow
capture models are a variant of the facility location problem and are based on determining
the optimal location for a certain facility based on flows in a network. This type of model
was first introduced by Fouska as work on discretionary service facilities (such as convenience stores and Automatic Teller Machines) (Berman et al., 1992) and independently by
Hodgson (Hodgson, 1990). The premise is that for some services, the traffic in a network
will stop for a service only if it is convenient while en route to another destination, and
will not make a dedicated trip. Therefore, the location of the facility must be based on the
existing flows and not on a desire by the traffic to make deliberate routing decisions based
on the discretionary services. The basic model was expanded for a number of generalizations, including traffic deviating by a small amount from their pre-planned routes for the
service (Berman et al., 1995). These models are generally used on transportation networks.
Our literature review resulted in no examples where these models were applied in a border
security context.
4.3.3
Other Border Security Models
There are a number of other models of border security measures that highlight the wide
variety of techniques possible. Bessman introduces a stochastic dynamic programming
model for an intelligent smuggler who can update his decisions to evade an interdictor in
a maritime setting (Bessman, 2010). Cfir outlines a model to show the optimal searching
patterns for cameras deployed on towers along a border (Szechtman et al., 2007). Patrascu
details heuristics for determining the best camera locations along a border based a set of
cameras with user-specified parameters and a probability of detection for different locations based on those parameters (Patrascu, 2007). Yildiz uses an agent based simulation
to compare the use of different types of UAVs and sensors to explore the utility of equipping border patrol forces with small, hand-launched UAVs Yildiz (2009). Ordonez builds a
comprehensive systems model intended to illustrate the effects of border security policies
between sectors of the US-Mexico border Ordonez (2006). All of these models capture
some specific element of border security, but have goals distinct from a military decision
support tool for sensors and patrolling guards.
56
4.3.4
Related Models with Military Applications
There are a number of models with military applications that relate to this work in terms of
sensors. Haider considers the specifications needed for UGS employment to assist precision targeting using a comparative study Haider (1998). Lamm considers the use of UGS
in sensor blocks, akin to a non-lethal minefield for information collection, where forces can
employ groups of sensors to gain information about a certain region Lamm et al. (2002).
The research develops a method for understanding the necessary density of UGS in order
to inform the required number of sensors in different combat formations. Separate from
UGS, but related to the idea of linking sensor allocations with guard performance, Rozen
introduces a model for employing a single UAV and a single patrolling vessel in a maritime
corridor using dynamic programming Rozen (2009). Culver explores a model about allocating reconnaissance assets that includes the effects of synchronizing ground based units
with UAVs to enhance the information gleaned from a reconnaissance objective Culver
(2013). A framework approach that could be used in some border security contexts was
developed by Keefe and Sullivan at RAND to expand on the IED hot-spot methodology
developed for the war in Iraq. Their Actionable Hot Spot methodology uses data to create
hot spots (through clustering and other traditional means) while considering constraints on
the resources that might be used to affect the hot spots so that the final result incorporates
what is possible for friendly force actions Keefe and Sullivan (2011).
4.4
Model Selection
For our application to border interdiction in the military (with resources as sensors or
guards), we do not use the network interdiction model. Because the emphasis in network
interdiction models is on a single smuggler - or a smuggling group making single attempts
- these models are hard to generalize to a wider border context with multiple infiltrating
groups. As stated, network interdiction models work extremely well for single attempt,
high-level smuggling actions such as a group of terrorists crossing into the United States
from Mexico, where deliberate preparations are taken by both sides based on this single
attempt.
In a military context with the network interdiction class of models, there might be a number of different enemy players each attempting to get through the border region, but with
a wide variety of origins, destinations, and goals. For example, the locations of enemy
57
support zones and supply caches on the sanctuary side of the border could lead to different origin nodes for different portions of enemy forces. Likewise, certain enemy elements
might have different destinations inside the country which weights their activity towards
certain destination nodes. This is further complicated by the fact that different enemy elements might be of differing levels of concern to friendly forces. These factors all lead
to a situation where the enemy may not operate in the same manner as a single, rationally
intelligent infiltrator. Consequently, this class of models does not capture the necessary
factors involved in the border interdiction system. As a consequence of not using this game
theoretic construct, we will have to use a different modeling aspect to account for a learning
enemy.
The flow capture model provides a number of benefits. First, it provides additional modeling power by providing a method for modeling the multiple enemy characteristics present
in the real problem. It also allows for a very usable set of decisions as part of the resource allocation that easily turn into a practical schedule. Additionally, it provides for
very pragmatic solving - the use of integer programming - which allow it to scale well to
realistically-sized problems. Most importantly for our system, the flow capture model provides the best method for bridging data about enemy movements into a modeling input, as
described in section 4.7.3.
4.5
Assumptions
We make a number of assumptions and approximations to successfully implement the models.
The largest assumption we make is that each guard has the same capability to interdict
an enemy force. Related to this, we also assume that any employed sensor can gather
information about any node (road intersection). These assumptions mean that the model
does not contain an exact representation of friendly forces capabilities. This means that
decision makers would need to use caution for new, unproven sensors, and would need to
only consider guards for interdiction and patrolling responsibilities if they thought that the
guard unit had the capability to interdict an enemy force.
In terms of tactical actions, we approximate the manner in which a patrol would actually
emplace an observation post or overwatch position by using the designated interdiction
location, or Named Area of Interest (NAI), as the destination for the patrol. This means
that for calculating routes and timing, we disregard the patrol-internal decisions related to
58
tactical deployment, such as internal OP locations, overwatch elements, and interdiction
team organization. We also calculate the intended route based on the ability to observe
during travel from the guard’s base, which assumes that the patrol has some limited capacity
to interdict on the move, and also that the route the patrol selects from a tactical, patrollevel standpoint will generally not deviate that greatly from the estimated route. These
assumptions are reasonable because they hold for all options the model considers, and
because they closely match the current staff planning process.
In terms of implementation, we approximate the timing needed for the schedule using the
largest granular level possible, since that allows us to solve a larger problem. For example,
if we can reasonably solve 12 time steps, then the schedule is more helpful if each time step
is 4 hours than if it is 1 hour. This is reasonable in terms of modeling enemy movement,
but puts some the smaller detailed planning within the time step back on the planning staff
and guard patrol leader.
4.6
General Approach - Flow Capture
We considered the problem through a functional decomposition in 3 to ensure that we had
an understanding of each of the main functions in the system. While the each of the critical
functions could require a unique approach for analytical improvement, we generally use the
flow capture model as the basis for starting the solutions and as the underlying formulation
for the two most critical decision support functions, “Determine Sensor Placements” and
“Patrol Scheduling”. Flow capture models are a variant of the facility location problem,
where in our adapted context the guards become the facilities to locate over time. The basic
topological input to the formulation is a network, where given the traffic flows on different
origin-destination pairs. The flow capture model uses a mixed integer linear program (MIP)
to solve for the optimal flow-capturing resource locations. Figure 4.6.1 illustrates a general
example of a flow capture scenario, as taken from its original context. In this example
there is one origin node, one destination node, and 9 additional nodes. There are 5 possible
origin-destination paths (shown in red), and each has a corresponding flow, which in this
case is the same for all paths. This network could represent traffic in an urban area, or
customers traveling through a shopping center. Given that there is one facility to locate,
such as an ATM, where should it be placed? In this simple example, the answer is at node
5 or node 8, and can be determined by inspection.
While the solution to the optimal location in Figure 4.6.1 can be determined by inspection,
in more complicated models a MIP formulation is needed. The general construct of the
59
Figure 4.6.1: Flow Capture Scenario Example: A toy example of a situation where the
flow capture model can be used to solve for the optimal facility location (blue rectangles)
based on the flows (red arrows) in the network
MIP is:
maximize: The expected amount of flow captured
subject to:
Available facilities, flows, topology
Variables:
Facility location
To properly formulate this MIP, we define the following notation.
Network
p∈P
fp
M
zj
=
yp
=
N nodes and E edges representing the trafficable routes in
the area
Paths for Origin-Destination pairs in the network
Traffic flow on path p
Number
of facilities available
(
1
if facility is located at node j
0
otherwise
(
1
if a facility is located on path p
0
otherwise
The formal flow capture model becomes:
60
max
∑
y,z
f py p
p∈P
s.t.
∑zj ≤ M
j
yp ≤
∑ zj
j∈p
y p ∈ {0, 1} ∀p
z j ∈ {0, 1} ∀ j
One key aspect of these problems, useful in our construct, is that they can account for “cannibalized flows”. If there are two facilities on the same path, no additional flow is captured
beyond what a single facility would have captured. This prevents the formulation from
placing multiple facilities in locations that would repeatedly capture the same flow, even
though we really gain no benefit from this repetitive capture. The programming formulation accounts exactly for “cannibalized flows” and it models the effects of two facilities
that impact the same flows. We will expand on this simple formulation as we develop some
of the different functions.
4.7
General Inputs
In our approaches to these different functions there are a number of common inputs. Most
of the inputs involve basic knowledge of the area of operations and the forces operating inside it – terrain, friendly forces, and enemy forces. These inputs will serve as the backbone
of the specific models we develop to implement the four functions of interest.
4.7.1
Topology
The first aspect of the border interdiction system that needs to be formalized is the terrain.
We need some capacity to capture the realities of the terrain in the border region, and as
described in section 4.6, the flow capture model is based on a directed graph.
The base input for the system is therefore a directed graph of nodes and edges that models
the trafficable routes in a border region. Edges exist along all possible routes, scaled for
61
the types of units the model is intended to plan for, and each edge would have a distance
associated with it. For example, if the traffic of concern was only motorized, then the only
routes needed in the model are those that can handle vehicular traffic. The distances are
scalable to incorporate aspects of road quality in the single distance metric. Nodes exist
at any intersection, and further additional nodes needed for methodological reasons can be
added, as needed.
The network includes an origin subset that consists of enemy source nodes on the neighboring country’s side of the border. These nodes originate the traffic in the model onto
edges that cross the border. For example, in Figure 4.7.1, the roads that start in Country
A would be modeled as beginning at an origin node. The major roadway in the lower left
could be modeled as the destination node if the enemy’s ability to reach that roadway meant
greatly increased freedom of movement and a much more difficult time interdicting them.
Additionally, the network has a subset of base nodes, which are the areas that serve as refit
points and secure areas for the guard units.
Figure 4.7.1: Example Road Network: A simplified road network in a border region where
the ends of the roads in country A are modeled as origin nodes, and the major roadway in
the lower left is modeled as the destination node.
These edges, nodes and subsets capture the simplified topology of the border region and the
terrain restrictions on friendly and enemy forces that operate in the area. Once this topology
62
is known, paths can be developed that show the possible routes between all the origindestination pairs. For example, if there were two source nodes and two sink nodes, then
there are four origin-destination pairs, and there might be multiple ways to travel the length
of each pair. This research does not address solving for these distances. The network is
known, and basically unchanging, so any shortest distance algorithm will suffice. Planners
could refine the possible enemy path choice options by pruning these possible combinations
with some common sense approaches based on knowledge of the details at the origin and
destination nodes.
4.7.2
Friendly Forces
The second major aspect of the border interdiction system that needs to be formalized is
the composition of the friendly forces.
A decision support tool for this problem would be most effective if it could incorporate a
wide variety of possible sensor types and guard units. It should not be technology-specific;
it can best serve a planner when it incorporates whatever sensors and guard types that a unit
has at the time. With this approach, the tool can assist a commander and his planners for
any ‘grab-bag’ of assets that may be available, immaterial of a specific technology.
With respect to sensor specifics, this thesis accounts only for the fact that a sensor meets
the criteria of allowing an operator to determine the presence of traffic at an intersection.
The specific capabilities of a certain sensor (range, detection type, imaging quality) are not
considered. The solution approaches discussed here require the ability for the detection to
be classified as a threat - this could be automatic, or with human-in-the-loop processing.
There is a large amount of work on sensor technology that can automatically recognize a
target and classify it as a certain type, however this technology is not a requirement.
A variety of unit types could be assigned to missions that include a border security component. In general, these units would be roughly of platoon size, and ground-based, probably
motorized. However, as long as the commander views the unit as capable of operating independently, the specific composition is not a necessary input. Each unit has four defining
characteristics that the planner inputs: speed, initial base location, patrol duration, and refit
time. This allows for mission selection based on how quickly units can travel and how long
they can operate before refitting.
Additionally, planners need to decide on a time horizon for the schedule planning. This
represents the limit of the schedule and will be decided as a function of scheduling neces63
sity, information available for future scheduling (availability of forces), and the tractability
of the formulations used.
4.7.3
Enemy Actions
The third major aspect of the border interdiction system that needs to be formalized is the
composition of the enemy forces.
Because of the methods selected for the functions, based on the flow capture MIP, we
simplify the necessary aspects of the enemy forces into flows in the network. Our main
construct for the enemy in the problem is a set of flows along origin-destination paths. If
we expect a certain number of enemy forces to traverse a path in a given time period, then
the flow on that path is the quantity of those forces. These flows are scalar values, but the
values can incorporate a number of descriptors about the enemy forces, if desired. This
allows the flow value function to serve as a weighted value function for the different types
of enemy with different destinations. For example, expected infiltration by motorized assets
might be scaled as twice as high (twice the flow value) as a dismounted enemy. Likewise,
enemy traffic headed towards a certain destination node might be weighted more heavily
than enemy traffic that is routing to an area that is less of a concern. This scaling allows
units to fine tune to whatever degree they choose the differences in enemy forces.
The more knowledge a unit has of an area, the more refined the initial enemy flow estimates
can be. However, without a lot of knowledge, the unit can still start the process. For
example, unit planners could develop the possible paths from the network and then equally
weight flows across all the different paths. With more knowledge of the network, the
planners could weight some paths, such as those with less security or better road surfaces,
higher than others, or segment the paths into clusters based on destination and equally
weight across destinations and not necessarily on individual paths. These values can be
uniform across time periods, or the planners can weight them differently in different time
periods. An example of this would be higher flows at night, or a much smaller amount of
flow on a certain day of the week.
We do not address it explicitly here, but the types of data available for analyzing enemy
movement along a border are frequently in a form that closely matches this path-based
estimate. Consequently, these enemy flows provide a relatively easy manner for capturing
the data available.
This input clearly represents the most uncertain and subjective input into the formulations.
This is partly a function of the difficulty in military planning to accurately capture detailed
64
knowledge of the enemy forces. It is, to a smaller degree, a necessary simplification to
create a workable model. Consequently, solutions to the functions in the problem should
consider a variety of different enemy flows as a means of testing the sensitivity of the
models. We introduce later the concept of a robust MIP to assist in finding good, valid
solutions for variations in the enemy flows.
These enemy flows create the set of flows for every origin-destination path considered in
the network for all time periods in the horizon. This is then the quantitative representation
of enemy movement across the border for the purposes of “Enemy Analysis”.
4.8
Basic Patrol Scheduling (B-PS)
We begin our description of the individual solution methods by describing the main decision support function in the base process, “Patrol Scheduling”, by developing the B-PS
MIP. We will add additional functionality to this formulation later in the section, and with
a robust optimization approach in the next section. “Patrol Scheduling”, as depicted in
Figure 4.8.1, is a function that takes as inputs the enemy and terrain evaluations from the
“Enemy Analysis” function and any updated performance metrics from the “Mission Feedback” function. It outputs a guard patrol schedule out to the planning horizon that serves
as the core operational planning document for the friendly forces operating in the border
region.
4.8.1
B-PS Model Description
We initially approach the patrol scheduling function as a flow capture, deterministic optimization problem as described in section 4.6. Using the inputs described in section 4.7we
develop a mixed integer linear program (MIP) that creates the best possible patrol schedule
for the available units. The concept of the formulation is:
maximize:
subject to:
Variables:
The expected amount of enemy units captured
Number of available guard units
Guard unit parameters (speed, base, patrol duration, refit time)
Network topology
Enemy flows
Guard locations
65
Figure 4.8.1: Placement of The “Patrol Scheduling” Function in the Border Interdiction
System
66
This formulation is a variant of the flow capture model that incorporates time. To fully incorporate some of the realistic limitations on guard abilities and to make a useful schedule,
we add some additional constraints to the formulation. First, we use the time parameter to
allow the model to incorporate guard speed and travel time, patrol duration limitations, and
patrol refit times. These let the model truly incorporate normal scheduling concerns that
a friendly forces headquarters would have to consider, and are reflected in subsectionsection 4.8.4, equations 4.8.4, 4.8.5, and 4.8.6. These factors are guard specific, and allow for
the model to fully account for the different factors that might impact a guard unit.
One distinct difference for this model is that we incorporate the ability to model guards
that do not capture the entire flow on a path. Multiple guards on a path would lead to complications, with subsequent guards capturing a percentage of the flow that escaped the first
guard. Adding an exact representation of this to the model would lead to a large number of
non-linear constraints, so we instead add a linear approximation of having multiple guards
on the same path to the model. Each guard has an effectiveness parameter that represents
the expected percentage of flow that the guard could capture. This parameter might be less
than 1 if the unit had limited lethality, or a limited observation range that allowed some
enemy traffic to bypass their position. This addition allows the model to consider the need
for multiple guards on the same path while incorporating a realistic limitation on patrols
and is reflected in subsection section 4.8.4, equation 4.8.10.
Additionally, we incorporate a new variable that allows us to account for the impact of
different mission configurations on the outcome. For example, we add a constraint to the
model that incorporates a penalty for a guard that patrols a location that was previously
occupied by a different guard. This is realistic since the shuffle between different guard
units at a certain location will probably degrade the overall friendly forces’ effectiveness
since some operational knowledge will be lost in the transition between units. This is
reflected in subsection section 4.8.4, equations 4.8.7, 4.8.8.
4.8.2
B-PS Terminology
To create this formulation, we first clarify additional terminology, and define our variables.
67
Network
Traffic
Guards
Sensors
Capture
Origin nodes
Destination nodes
Base nodes
p∈P
δi j
f p,t
zk, j,t
ek, j,t
y p,t
durk
re f itk
speedk
α
βk
θ
=
N nodes and E edges representing the trafficable routes in the border
region
Enemy individuals and units crossing the border
The subset of the friendly forces tasked to border security operations
Any technology used to detect traffic at a given place along the border
The generic result of a guard interdicting an enemy unit (stop and
release, capture, or kill)
The subset of the network that serves as the source for the traffic
The subset of the network that serves as the sink for the traffic
The subset of the network that serves as a base for guard units
Paths for Origin-Destination pairs in the network that
represent all the possible options for enemy travel across
the border
Shortest distance between nodes i and j in the network
Traffic
flow on path p at time t
(
1
if guard kis assigned to patrol node jat time t
(Decision
0
otherwise
Variable)
Factor between 0 and 1 for the mission-related
effectiveness of the unit based on the configuration of
guards to topology
Factor between 0 and 1 representing the percent of traffic
captured from path p at time t
The maximum patrol duration allowed for guard k
The refit time necessary for guard k
Parameter for the maximum travel speed of guard k
Parameter for controlling the value of having multiple
guards on one path
Effectiveness parameter that gives the capture value of
guard k based on the guard’s composition
Parameter that decreases the value of capture based on the
mission configuration of the node at t − 1
68
4.8.3
B-PS Inputs
The following inputs are necessary for the MIP, and are the quantified elements from section 4.7.
Topology:
Network, Origin nodes, Destination nodes, Base nodes, δi j
values
Traffic behavior:
f p,t for all paths and times, estimated enemy speed
Guard details:
Duration, refit, initial location, and speed for all guard units
Planning horizon: The number of time periods the patrol schedule is planned
for, T
69
4.8.4
B-PS Formulation
O BJECTIVE F UNCTION
max
e,y,z
∑∑
f pt y pt
t p∈P
C ONSTRAINTS
∑∑ ∑
t
zk j0 : given ∀k
(4.8.1)
zk jt = 0
(4.8.2)
k j∈O,D
∀k,t
∑ zk jt = 1
(4.8.3)
j
zk jt ≤ zk, j,t−1 +
zk,i,t−1
∑
∀k, j,t
(4.8.4)
i:δi j ≤speedk
t+durk +1
∑ ∑ zk, j,m ≥ ∑ zk, j,t − ∑ zk, j,t+1
m=t+2 j∈B
j∈B
∀k,t < T − durk
(4.8.5)
j∈B
t+re f itk
∑ ∑ zk, j,m ≤ durk ∑ zk, j,t + durk (1 − ∑ zk, j,t+1)
m=t+2 j6∈B
j∈B
ek jt ≤ 1 − θ
∀k,t < T − 1
(4.8.6)
j∈B
∑ zm, j,t−1
∀k, j,t > 0
(4.8.7)
m6=k
ek jt ≤ zk jt
∀k, j,t
y pt ≤ ∑ ∑ ek jt
(4.8.8)
∀p,t
(4.8.9)
k j∈p
y pt ≤ α + ∑ ∑ βk ek jt
∀p,t
k j∈p
y pt ∈ [0, 1] ∀p,t; zk jt ∈ {0, 1} ∀k, j,t;
ek jt ∈ [0, 1] ∀k, j,t
70
(4.8.10)
C ONSTRAINT E XPLANATIONS
The following list summarizes each of the constraints above.
(4.8.1)
(4.8.2)
(4.8.3)
(4.8.4)
(4.8.5)
(4.8.6)
(4.8.7,4.8.8)
(4.8.9)
(4.8.10)
The initial guard locations are known ahead of time, and serve as the
initializing conditions for the patrols.
No guards can patrol on the origin nodes because they are in the
neighboring country. Additionally, no guards can patrol on the sink
nodes because they represent the limiting location where no further
interdiction can happen.
Guards can only be assigned to one place at a time.
Future guard locations are restricted to locations that the guard can
reach within a time period based on the guards’ speed.
If a guard is on a base at time t, and on a patrol at time t + 1, it must
return to base prior to its maximum patrol duration in order to refit.
Upon returning from a patrol, a guard must stay on base long enough
to refit.
The effectiveness factor is below 1 for guard k at node j, when a
different guard was at node j at t − 1. This accounts for a decrease in
effectiveness due to transitioning guards on the same node.
If a guard is on path p at time t, then the capture factor, y, can take a
value greater than 0. This means that a capture can only occur for a
certain path if there is a guard on that path.
The capture factor increases linearly with the number of units on the
path. This represents an increased ability to capture traffic based on
having multiple guards.
This formulation reflects basic patrol scheduling for the guards. It completes the addition of an analytic decision support tool to the base process involved in planning border
interdiction activities.
4.9
Determine Sensor Placements (DSP)
We now proceed to the second major decision support function in the system, “Determine Sensor Placements”. The ability to effectively incorporate improved enemy estimates
hinges in large part on the initial emplacement of the sensors. Since these are difficult to
71
move once emplaced, the decision about where to place sensors has a more enduring impact than the decision on where to send a certain patrol. “Determine Sensor Placements”,
as depicted in Figure 4.9.1, is a function that takes as inputs the enemy and terrain evaluations from the “Enemy Analysis” function and any updated performance metrics from the
“Mission Feedback” function. Additionally, the availability of any new sensors is detected
by this function. “Determine Sensor Placements” outputs recommended locations for the
sensors.
Figure 4.9.1: Placement of The “Determine Sensor Placement” Function in the Border
Interdiction System
The sensors in the network provide two capabilities. First, they provide the mechanism for
refining the flow value estimates for future use in the scheduling and other functions. In
this capacity, the sensors provide the best mechanism for “learning” over time. Second, the
sensors provide an ability, through the “dynamic retasking function”, to collect information
for immediate use that allows real-time guard adjustments. Sensors at any node can provide
utility for both of these functions, but the optimal location for one may not be optimal for
the other. We focus our formulation on the ability to support a patrol in real-time, knowing
that the sensors can still provide useful information for updating the estimates of enemy
flows. To illustrate these functions we introduce a sequence of simple example scenarios.
In the following examples, we assume there are two sensors and one guard. The border
72
is denoted by the dashed black line. Consider the simple network in Figure 4.9.2, which
represents three valleys that lead across a border with a single connecting road accessible
by the guards. The guards are unable to locate at the origin because it is across the border
or at the destination since it signifies the area in the region where capture is no longer likely
because of excessive branching, population density, or another factor. If we assume equal
flows across the three different paths (in red), each with the same amount of uncertainty,
then a sensor at any node provides the same level of “learning” for future use in refining
flow values. The sensor would only provide useful information about the enemy path on
which it was located.
To assist guards in dynamically intercepting enemy forces in real-time, the optimal sensor
locations are on nodes 1 and 3 with the guard at node 8. This allows the guard to move from
the middle path to either of the other paths if the sensors detect an enemy movement. If the
guard’s speed was significantly greater than the enemy’s speed, then the guard’s location
could be either nodes 7, 8, or 9 as long as the sensors were on the two other paths. The key
is that the guard occupies the path that does not have the early detection from the sensors.
Clearly the ability to correctly position sensors relies to some degree on the relative speeds
of the guards and the enemy, the quantity of guards, and the likely location of those guards.
Figure 4.9.2: Sample Network 1: An illustration of employing sensors and a guard in tandem to capture the optimal amount of enemy forces in a network with limited connectivity.
The guard (blue rectangle) can move either left or right in response to a sensor (green
circles) detection.
Consider now the same network, but with connecting roads from the outer routes to the
73
central route, as depicted in Figure 4.9.3. There are now five different paths in the network
from origin to destination. In this example, a sensor at any node without branching yields
no additional information for “learning”. A sensor at a node with branching could conceivably provide more information - by narrowing down the uncertainty in the flow estimate
for the combined paths. However, it could also provide less information if the future detections from the sensor produced no updates or useful distinctions about the traffic on the
subsequent paths that go through that node. For example, a sensor at node 5 would provide
detections on the majority of the paths, but without any distinction about which path (2, 4,
or 5) the enemy traffic was traveling on.
Figure 4.9.3: Sample Network 2: An illustration of employing sensors and a guard in
tandem to capture the optimal amount of enemy forces in a network with moderate connectivity. The guard (blue rectangle) can move either left or right in response to a sensor
(green circles) detection.
Additionally, in this case, the sensors are optimally placed on nodes 4 and 6 since placement
on nodes 1 and 3 would not allow for information on if the traffic was staying on the outer
route (paths 1 or 3) or taking the connector road to the central route (paths 4 or 5). This
indicates that the utility of a sensor for dynamically intercepting enemy threats is not simply
a function of providing more space between the sensor and guard or a function of how close
the sensor is to the border. The topology of the network distinctly matters.
We can quantify this feature using an approach we call “extended reach”. In the above
example, the guard receives value by capturing the flow along paths 2, 4, and 5 by locating
at node 8. If however, there are sensors at nodes 4 and 6 and the enemy’s speed is assumed
74
to be roughly equal (or less) than the guard’s speed, then a sensor detection at node 4 or
node 6 provides the guard with enough warning time to move to nodes 7 or 9 respectively
to capture that enemy as well. In effect, the guard’s reach is extended beyond node 8 to
include both nodes 7 and 9 because of the sensors located at nodes 4 and 6. This “extended reach” assumes some initial knowledge of the enemy’s speed, and also assumes that
multiple detections will not happen simultaneously for the same guard. Both of these are
operationally reasonable.
Based on the difficulty of quantifying the ability to “learn” in a network, we focus on the
“extended reach” reach concept in formulating the “Determine Sensor Placement” function. Because this concept applies directly to the utility of the guard’s placement in the
scheduling function, ideally the sensor placement would be determined at the same time
as the guard schedule, thereby allowing for a fully synchronized plan. In essence, if the
two functions occurred on the same cycle (for example, every three days), then those two
functions could be solved simultaneously in a coupled manner However, for operational
purposes, this is not feasible. Over time, different guard quantities may be available along
with adjustments in flow values, but the sensors will generally remain in place. For example, over the course of a month the scheduling function may provide updates ten times
with a changing configuration of available guard units and with new flow value estimates
halfway through the month. The sensors however, remain in place. Consequently, even if
we can solve a coupled problem, we need some method to decouple the sensor placement
from the scheduling function for operational implementation. .
One additional network example is instructive for understanding the model that follows. In
the subset of a network, depicted in Figure 4.9.4, there exists a sensor at node 1 and a guard
at node 4 (for reasons not reflected in the subset that is depicted). In this case, the guard
should get “extended reach” credit for node 3 because the guard’s speed is equal to the
enemy’s speed. However, the guard will only know to move to node 3 if the sensor at node
1 detects a threat. Therefore, the “extended reach” credit does not include path 3 since that
does not travel through a sensor. Additionally, path 2 traffic will be detected by sensor 1,
but will not travel through node 3. So, the “extended reach” of the guard at node 4 includes
node 3, but only for traffic on path 1. This example highlights some of the complications
in formulating an “extended reach” concept.
4.9.1
DSP Model Description
We approach this problem as an optimization problem similar to the “Patrol Scheduling”
function from section 4.8.4. We take the same formulation, but add in additional decision
75
Figure 4.9.4: Sample Network 3: Determining Sensor Placement and “Extended Reach” the guard (blue rectangle) has the ability to intercept enemy movement on path 1 (through
the sensors - green circles), but not path 2 or path 3 since those flows do not travel through
the sensor location and towards the guard
variables for sensors. Then, using the estimated enemy speed and a reasonable assumption for the number of guards that will generally be available, we optimize the coupled
problem of sensor placement and guard placement. Of note is the use of the estimated
guard configuration. Because the sensors will be emplaced in the chosen locations well
beyond the friendly forces’ initial knowledge of guard availability, we use an estimate of
likely guard configuration as opposed to exactly what is available at that time. The result
is a good idea about the sensor locations that provide the best in-tandem results when employed with guards in the future. The model we develop, because it solves the coupled
problem of sensor emplacement and guard scheduling could extend to other applications
where an operational implementation requires deciding on the two results at the same time.
The concept of the formulation is:
maximize:
subject to:
Variables:
The expected amount of enemy captured
Number of available guard units
Guard unit parameters (speed, base, patrol duration, refit time)
Network topology
Enemy flows
Sensor locations, Guard locations
76
To accomplish the goal of placing sensors, we need to quantify the concept of “extended
reach”. We do this by adding variables that account for extended reach and for capture
along a path because of extended reach. These two variables are analogous to the basic flow
capture model: guard location is denoted by z, and extended reach capability is denoted by
r. Flow capture on a path from a guard’s presence is denoted by y, and the extended reach
capture on a path is denoted by d. We then combine the two types of flow capture on paths
as seen in section section 4.9.4, equation 4.9.16.
To solve for which nodes a guard can reach based on certain sensor locations, we create a
composite variable w, based on sensor and guard locations at a certain time. We then restrict
the extended reach variable r based on this composite variable, the network topology and
guard and enemy speeds as reflected in section section 4.9.4, equation 4.9.13.
4.9.2
DSP Terminology
To create this formulation, we first clarify additional terminology, and define our variables.
Additions to the formulation from section 4.8.4 are outlined.
Network
Traffic
Guards
Sensors
Capture
Origin nodes
Destination nodes
Base nodes
N nodes and E edges representing the trafficable routes in the border
region
Enemy individuals and units crossing the border
The subset of the friendly forces tasked to border security operations
Any technology used to detect traffic at a given place along the border
The generic result of a guard interdicting an enemy unit (stop and
release, capture, or kill)
The subset of the network that serves as the source for the traffic
The subset of the network that serves as the sink for the traffic
The subset of the network that serves as a base for guard units
77
p∈P
δi j
f p,t
zk, j,t
=
ek, j,t
y p,t
d p,t
rk,l,t
=
si
=
wi,k, j,t
=
Reachk
durk
re f itk
speedk
α
βk
θ
Paths for Origin-Destination pairs in the network that represent all the
possible options for enemy travel across the border
Shortest distance between nodes i and j in the network
Traffic
flow on path p at time t
(
1
if guard kis assigned to patrol node jat time t
0
otherwise
Factor between 0 and 1 for the mission-related effectiveness of the unit
based on the configuration of guards to topology
Factor between 0 and 1 representing the percent of traffic captured
from path p at time t
Factor between 0 and 1 representing the percent of traffic captured from path
p at time t from the extended reach of guards
(
1
if guard k can reach node l, within certain criteria, at time t
0
otherwise
(
1
if a sensor is assigned to node i
0
otherwise
(
1
if a sensor is at node i, guard k is assigned to patrol node j at time t
0
otherwise
An n x n matrix where each cell {i, l}is the set of nodes such that a guard at
one of the nodes in the set can capture the enemy at node l after notification
from a sensor at node i, j 6= l
Parameter for the maximum patrol duration allowed for guard k
The refit time necessary for guard k
Parameter for the maximum travel speed of guard k
Parameter for controlling the value of having multiple guards on one
path
Effectiveness parameter that gives the capture value of guard k based
on the guard’s composition
Parameter that decreases the value of capture based on the mission
configuration of the node at t − 1
78
4.9.3
DSP Inputs
The following inputs are necessary for the MIP, and are the quantified elements from section 4.7.
Topology:
Network, Origin nodes, Destination nodes, Base nodes, δi j
values
Traffic behavior:
f p,t for all paths and times, estimated enemy speed
Guard details:
Duration, refit, initial location, and speed for all guard units
Planning horizon: The number of time periods the patrol schedule is planned
for, T
4.9.4
DSP Formulation
O BJECTIVE F UNCTION
max
d,e,r,s,w,y,z
∑∑
t p∈P
79
f pt y pt
C ONSTRAINTS
zk j0 : given ∀k
∑∑ ∑
t
zk jt = 0
(4.9.1)
∑
si = 0
(4.9.2)
∑ zk jt = 1
∀k,t
(4.9.3)
k j∈O,D
i∈O,D
j
zk jt ≤ zk, j,t−1 +
∀k, j,t
zk,i,t−1
∑
(4.9.4)
i:δi j ≤speedk
t+durk +1
∑ ∑ zk, j,m ≥ ∑ zk, j,t − ∑ zk, j,t+1
m=t+2 j∈B
j∈B
∀k,t < T − durk
(4.9.5)
j∈B
t+re f itk
∑ ∑ zk, j,m ≤ durk ∑ zk, j,t + durk (1 − ∑ zk, j,t+1)
m=t+2 j6∈B
j∈B
ek jt ≤ 1 − θ
∀k,t < T − 1
(4.9.6)
j∈B
∀k, j,t > 0
∑ zm, j,t−1
(4.9.7)
m6=k
ek jt ≤ zk jt
∀k, j,t
(4.9.8)
∑ si ≤ p
(4.9.9)
si = 0
(4.9.10)
i
∑
i∈O,D
wik jt ≤ si
∀i, k, j,t
wik jt ≤ zk jt
rklt ≤
(4.9.11)
∀i, k, j,t
∑
∑
(4.9.12)
wi,k, j,t
∀k, l,t
(4.9.13)
i∈l + j∈Reach(i,l)
d pt ≤ ∑ ∑ rk, j,t
∀p,t
(4.9.14)
k j∈p
d pt ≤ ∑ si
∀p,t
(4.9.15)
i∈p
y pt ∑ ∑ (ek, j,t ) + d p,t
∀p,t
(4.9.16)
k j∈p
y pt ≤ α + ∑ ∑ βk (ek jt ) + d p,t
∀p,t
(4.9.17)
k j∈p
y pt ∈ [0, 1] ∀p,t;
zk jt ∈ {0, 1} ∀k, j,t;
si ∈ {0, 1} ∀i;
d pt ∈ [0, 1] ∀p,t;
(4.9.18)
ek jt ∈ [0, 1] ∀k, j,t;
rklt ∈ {0, 1} ∀k, l,t;
wik jt ∈ {0, 1} ∀i, k, j,t
80
(4.9.19)
(4.9.20)
C ONSTRAINT EXPLANATIONS
The following list summarizes each of the constraints above.
(4.9.1)
The initial guard locations are known ahead of time, and serve as the
initializing conditions for the patrol.
(4.9.2)
No guards can patrol on the origin nodes because they are in the
neighboring country. Additionally, no guards can patrol on the sink
nodes because they represent the limiting location where no further
interdiction can happen. Likewise for sensors.
(4.9.3)
Guards can only be assigned to one place at a time.
(4.9.4)
Future guard locations are restricted to locations that the guard can
reach within a time period based on the guards’ speed.
(4.9.5)
If a guard is on a base at time t, and on a patrol at time t + 1, it must
return to base prior to its maximum patrol duration in order to refit.
(4.9.6)
Upon returning from a patrol, a guard must stay on base long enough
to refit.
(4.9.7,4.9.8)
The effectiveness factor is below 1 for guard k at node j, when a
different guard was at node j at t − 1. This accounts for a decrease in
effectiveness due to transitioning guards on the same node.
(4.9.9)
The sensors are limited to the quantity on hand.
(4.9.11,4.9.12) The construction of a composite variable, w, based on sensor and guard
locations
(4.9.13)
Indicator for which nodes a guard and sensor combination provide
extended reach
(4.9.14,4.9.15) If there is a node with extended reach coverage is on path p at time t,
then the extended reach capture factor, d, can take a value greater than
0.
(4.9.16)
If a guard is on path p at time t, or has extended reach to path p, then
the capture factor, y, can take a value greater than 0.
(4.9.17)
The capture factor increases linearly with the number of units on the
path. This represents an increased ability to capture traffic based on
having multiple guards.
This formulation adds the capacity to analytically decide on where to place sensors. It
provides the initial work for adding sensor data and cueing to planning border interdiction
activities.
81
4.10
Dynamic Guard Retasking (DR)
This section outlines the analytical approach to dynamic guard retasking. The intent is to
create a tool for employment in the friendly forces headquarters that allows for guards on
mission to respond to sensor detections, thereby taking advantage of the utility created in
the “extended reach” emplacement of the sensors.
To make full use of the extended reach sensor capabilities, we need to ensure that forces
have a fast, reliable method for determining when, and which units can respond to a sensor
detection. To do that, we develop the “Dynamic Guard Retasking” function. “Dynamic
Guard Retasking”, as depicted in Figure 4.10.1, is a function that takes as inputs the enemy and terrain evaluations from the “Enemy Analysis” function, the sensor locations and
any detections, the guard taskings and the current status of forces operating in the area. It
outputs new taskings to the guard units currently operating based on their ability to immediately respond to the sensor detections.
Figure 4.10.1: Placement of The “Dynamic Guard Retasking” Function in the Border
Interdiction System
82
4.10.1
DR Model Description
We approach the dynamic retasking function as an algorithm needed to quickly determine
the best possible retaskings for the guards after a sensor cue. Because this function operates
in real time, speed is more crucial here than in other functions. To facilitate fast computation, we limit our approach to possible retasking options that lead to the possibility of
capturing the detected enemy forces within one hour. This assumption is reasonable in real
world conditions since the likelihood of capturing the enemy after an hour based is very
low in most cases because of the number of possible paths the enemy can travel on.
The algorithm we develop is a modified version of a greedy heuristic for the flow capture
model. In the truncated network that we consider, the node with the sensor detection serves
as the origin, and the destination nodes are the outermost nodes that the enemy could travel
to within one hour. A key distinction though is that not every node within the network is
feasible, since the guard would need to get there prior to the enemy. We consider the probability of the enemy traveling to a certain node, and use the quantity of possible flows that
travel through both the detection node and the considered node as the means of developing
the probability.
4.10.2
DR Terminology
We first clarify some new terminology.
s
δi j
N js ∀ j, s
ts ji
tkli
Sk
B
pi
The speed classification for an enemy element, where s ∈ {1, 2, 3}for
slow, medium or fast with corresponding, pre-determined, estimated
speeds. This allows for refining the previously estimated speed based
on information from the sensor detection. This is important since the
estimated enemy speed initially my not match the true enemy speed as
estimated from the sensor detection.
The distance from node i to node j
The set of all nodes accessible within 1 hour from node j for an enemy
with a speed classification s
The time for an enemy with speed s to travel from node j to node i
The time for guard k to travel from node l to node i
The set of nodes that are possible retasking options for guard k
The retasking vector with non-empty components bk if guard k is
retasked to node bk
The probability of the detected enemy traveling to node i
83
4.10.3
DR Inputs
Basic Topology: Network, Origin nodes, Destination nodes, Base nodes, δi j values
N js ∀ j, s
The set of all nodes accessible within 1 hour from node j for an enemy
with a speed classification s where s ∈ {1, 2, 3}for slow, medium or fast
Guard details:
Speed for all guard units, and the current locations
4.10.4
DR Algorithm
Trigger: Enemy is detected at node j by a sensor
1. Classify the enemy speed (could be human in the loop or based on simple criteria
about the mode of travel)
(a) Determine s, where s ∈ {1, 2, 3}
2. Determine possible enemy locations within one hour
(a) Access N js
3. Determine if any guards can intercept at a possible location within one hour
(a) For all k guards:
i. Sk ∈ {}
ii. Access guard’s current location, l:
iii. For all i ∈ N js :
A. If tkli < ts ji , add i to Sk
4. Determine the best possible guard retaskings:
(a) Iter = 0
(b) retasking vector:B = { {}∀k }
(c) If there exists a guard k | Sk 6= ∅:
i. Issue retasking preparatory order to all guards k | Sk 6= ∅ with all information about node j
84
ii. Iter + +
iii. total jIter =
fp
∑
p| j∈p b∈p
/
iv. For i ∈ N js , i ∈
/ B:
∑
A.
pIter
i
=
fp
p|i, j∈p b∈p
/
total jIter
v. For all guards k | Sk 6= ∅:
A. Determine c(k): argmax pi ∀i ∈ Sk
vi. Select argmax pc(k) ∀k
vii. Set bk = c(k) f or k ∈ argmax
viii. Issue retasking order to guard k for location bk
ix. Repeat step (c)
This algorithm develops the set of retasking orders for all guards that have the opportunity
to intercept the enemy. The friendly forces headquarters can use the probability pi of the
enemy traveling to a certain node to refine the yes/no decision to send an individual guard.
The algorithm, in step 4(c), removes from consideration the flows that already have a guard
assigned to a node that might intercept them. As such, this algorithm is a version of a
greedy heuristic for a flow capture problem, but with flows limited to only those that travel
through the node with the enemy detection.
The implementation of this algorithm in a friendly forces’ headquarters would allow the
unit to capitalize on emplaced sensors by retasking guards to react to sensor detections.
Importantly, because the emphasis is on calculation speed, the friendly forces staff could
have time to evaluate the possible nodes in N js and select an intercept node based on additional information or intelligence assessments not captured in the initial flow values that
are used to calculate pi .
4.11
Enhanced Patrol Scheduling (E-PS)
We can now revisit the “Patrol Scheduling” function to incorporate the ability of the guards
to dynamically respond to sensor detections. Now that the friendly forces have the capacity
to dynamically retask guards, the patrol schedule that they develop should position guards
with the knowledge that they can respond dynamically to a detection. For example, in
general it now does not make sense to place a guard at the same location as a sensor since
85
the guard could probably be re-positioned in a different location with more effectiveness.
This incorporates the “extended reach” capability developed in section 4.9.4.
With the sensor locations fixed, the formulation is less complex than an exact implementation of the “Determine Sensor Placements” function. In fact, the formulation is exactly the
same, except the sensor locations, s, are no longer decision variables, but input data to the
formulation. Because the sensor locations are no longer decisions, the formulation also no
longer requires the composite variable for sensor and guard locations, w, and the extended
reach path capture indicator, d (since the effects can be added directly into the normal path
capture indicator). So, after the sensors are emplaced, the friendly forces headquarters
can now implement a slightly simplified version of the “Determine Sensor Placements”
function, but can use the exact details of the guard units on hand.
4.11.1
E-PS Model Description
We take the “Determine Sensor Placements” function and change the sensor decision variable into input data.
4.11.2
E-PS Terminology
To create this formulation, we first clarify additional terminology, and define our variables.
Network
Traffic
Guards
Sensors
Capture
Origin nodes
Destination nodes
Base nodes
N nodes and E edges representing the trafficable routes in the border
region
Enemy individuals and units crossing the border
The subset of the friendly forces tasked to border security operations
Any technology used to detect traffic at a given place along the border
The generic result of a guard interdicting an enemy unit (stop and
release, capture, or kill)
The subset of the network that serves as the source for the traffic
The subset of the network that serves as the sink for the traffic
The subset of the network that serves as a base for guard units
86
p∈P
δi j
f p,t
zk, j,t
=
ek, j,t
y p,t
Paths for Origin-Destination pairs in the network that represent all the
possible options for enemy travel across the border
Shortest distance between nodes i and j in the network
Traffic
flow on path p at time t
(
1
if guard kis assigned to patrol node jat time t
0
otherwise
Factor between 0 and 1 for the mission-related effectiveness of the unit
based on the configuration of guards to topology
Factor between 0 and 1 representing the percent of traffic captured
from path p at time t
(
rk,l,t
Reachk
durk
re f itk
speedk
α
βk
θ
4.11.3
=
1
if guard kcan reach node l, within certain criteria, at time t
0
otherwise
An n x n matrix where each cell {i, l}is the set of nodes such that a
guard at one of the nodes in the set can capture the enemy at node l
after notification from a sensor at node i, j 6= l
Parameter for the maximum patrol duration allowed for guard k
The refit time necessary for guard k
Parameter for the maximum travel speed of guard k
Parameter for controlling the value of having multiple guards on one
path
Effectiveness parameter that gives the capture value of guard k based
on the guard’s composition
Parameter that decreases the value of capture based on the mission
configuration of the node at t − 1
E-PS Inputs
The following inputs are necessary for the MIP, and are the quantified elements from section 4.7.
87
Topology:
Network, Origin nodes, Destination nodes, Base nodes, δi j
values
Traffic behavior:
f p,t for all paths and times, estimated enemy speed
Guard details:
Duration, refit, initial location, and speed for all guard units
Planning horizon: The number of time periods the patrol schedule is planned
for, T
4.11.4
E-PS Formulation
O BJECTIVE F UNCTION
max
e,r,y,z
min
f ∈U
∑∑
t p∈P
88
f pt y pt
C ONSTRAINTS
zk j0 , si : given ∀k, i
∑∑ ∑
t
(4.11.1)
zk jt = 0
(4.11.2)
k j∈O,D
∀k,t
∑ zk jt = 1
(4.11.3)
j
zk jt ≤ zk, j,t−1 +
∀k, j,t
zk,i,t−1
∑
(4.11.4)
i:δi j ≤speedk
t+durk +1
∑ ∑ zk, j,m ≥ ∑ zk, j,t − ∑ zk, j,t+1
m=t+2 j∈B
j∈B
∀k,t < T − durk
(4.11.5)
j∈B
t+re f itk
∑ ∑ zk, j,m ≤ durk ∑ zk, j,t + durk (1 − ∑ zk, j,t+1)
m=t+2 j6∈B
j∈B
ek jt ≤ 1 − θ
∀k,t < T − 1
(4.11.6)
j∈B
∀k, j,t > 0
∑ zm, j,t−1
(4.11.7)
m6=k
ek jt ≤ zk jt
∀k, j,t
rklt ≤
(4.11.8)
∀k, l,t
(4.11.9)
y pt ≤ ∑ ∑ (ek, j,t + rk, j,t ) ∀p : i ∈ p,t
(4.11.10)
y pt ≤ ∑ ∑ ek, j,t
(4.11.11)
zk, j,t
∑
j| j∈Reachk (i,l)∀(i=1)∈l +
k j∈p
∀p : i ∈
/ p,t
k j∈p
y pt ≤ α + ∑ ∑ βk (ek jt + rk jt ) ∀p : i ∈ p,t
(4.11.12)
y pt ≤ α + ∑ ∑ βk ek jt
(4.11.13)
k j∈p
∀p : i ∈
/ p,t
k j∈p
y pt ∈ [0, 1] ∀p,t;
ek jt ∈ [0, 1] ∀k, j,t
zk jt ∈ {0, 1} ∀k, j,t;
rklt ∈ {0, 1} ∀k, l,t
89
(4.11.14)
C ONSTRAINT E XPLANATIONS
(4.11.1)
The initial guard and sensor locations are known ahead of time, and
serve as the initializing conditions for the patrol.
(4.11.2)
No guards can patrol on the origin nodes because they are in the
neighboring country. Additionally, no guards can patrol on the sink
nodes because they represent the limiting location where no further
interdiction can happen.
(4.11.3)
Guards can only be assigned to one place at a time.
(4.11.4)
Future guard locations are restricted to locations that the guard can
reach within a time period based on the guards’ speed.
(4.11.5)
If a guard is on a base at time t, and on a patrol at time t + 1, it must
return to base prior to its maximum patrol duration in order to refit.
(4.11.6)
Upon returning from a patrol, a guard must stay on base long enough
to refit.
(4.11.7,4.11.8)
The effectiveness factor is below 1 for guard k at node j, when a
different guard was at node j at t − 1. This accounts for a decrease in
effectiveness due to transitioning guards on the same node.
(4.11.9)
Indicator for which nodes a guard and sensor combination provide
extended reach
(4.11.10,4.11.11) If a guard is on path p at time t, or has extended reach to path p, then
the capture factor, y, can take a value greater than 0.
(4.11.12,4.11.13) The capture factor increases linearly with the number of units on the
path. This represents an increased ability to capture traffic based on
having multiple guards.
The enhancement to the “Patrol Scheduling” function now allows the unit to fully incorporate the impact of the sensors on the guard taskings.
4.12
Mission Feedback
To truly implement a closed-loop system where the results of the missions are evaluated
and incorporated into the planning process, we need to develop a “Mission Feedback” function. Many aspects of this - for example: assessments of certain guard units or qualitative
90
analyses of population centers - are not easily quantified, and formulaic approaches probably harm a true evaluation of the on-the-ground reality. However, there are some aspects
of border interdiction operations that benefit from further analytic inquiry.
Figure 4.12.1: Placement of The “Mission Feedback” Function in the Border Interdiction
System
To evaluate operations, we can run simulations to compare other mission plans, or the
missions actually executed (after the fact), to the optimal solutions. For example, if some
sensors have already been emplaced, we can compare the optimal location of sensors with
the current locations. We can then weigh the costs of changing the placements in terms
of mission risk with the possible gain in security improvements. We can also analyze the
impact of changes in force allocation. For example, we can compare the change in effectiveness for if the friendly forces have additional sensors, or a different quantity of available
guards. With this information, the friendly forces headquarters can weigh resource allocation decisions between border security missions and other missions. This also provides
evidence to a unit for friendly force requests.
We focus our “Mission Feedback” work on using analytic methods for decision support to
assist the commander and staff in determining the effects of additional forces. The first aspect of this is establishing the marginal utility of a sensor. We need to develop an approach
that gives us the incremental value of having an additional sensor in terms of interdicting
91
Figure 4.12.2: Marginal Benefit of a Sensor: A sample graph of the utility of additional
sensors based on an updated assessment of the situation
enemy forces for the given situation at hand. Specifically, for a certain topology, usual
guard force, and updated enemy flows based current data we want to present the commander with the ability to weigh the utility of additional sensor emplacement missions.
Figure 4.12.2 illustrates the basic graphical approach. We iterate the “Determine Sensor
Placements” function for different levels of sensors to determine an upper bound on the
effectiveness of border interdiction efforts based on the guard forces on hand. Then, based
on the commander’s internal evaluation of mission risk, he can decide about the utility of
future sensor emplacements.
The second aspect is presenting the utility of additional guard forces. In general, guard
units would be harder to add into an area than sensors based on general availability of
forces. Figure 4.12.3 illustrates the basic graphical approach. We iterate the “Determine
Sensor Placements” function for different levels of sensors to determine an upper bound
on the effectiveness of border interdiction efforts for a certain quantity of emplaced or
on hand sensors. The commander can then decide if he wants to allocate forces from a
different tasking to border interdiction, request and try to justify additional forces, continue
with the current amount of forces, or re-assign forces from border interdiction to different
taskings.
Other aspects of “Mission Feedback” relate predominately to determining if the actual outcomes are matching the expected outcomes. Based on discrepancies between the functions
provided and real results (in terms of capturing enemy forces), friendly forces could update
enemy flows are refine the estimation of the enemy situation.
92
Figure 4.12.3: Marginal Benefit of a Guard: A sample graph of the utility of additional
guards based on an updated assessment of the situation
4.13
Summary of Models
In this chapter, we presented analytic solutions to our four decision-focused, critical functions from the border interdiction system. We created four models, with two options for the
“Patrol Scheduling” function, based on the presence of sensors, and highlighted the use of
the models for evaluating decisions in the “Mission Feedback” function.
93
94
Chapter 5
A Robust Approach
In this chapter, we introduce a robust optimization approach to solving the main flow capture formulation, R-DSP, that takes the solution to the “Determine Sensor Placements”
function DSP), and includes some consideration of uncertainty. This approach extends
similarly for the other models. We explain the the need for a robust approach, and conduct
a literature review of robust linear programming. Then we introduce a robust formulation
for the “Determine Sensor Placements” function. A comparable formulation for “Patrol
Scheduling” could be created analogously.
5.1
Motivation and Background
So far we have developed a series a strictly deterministic mixed integer programming formulations. We assume in each of these formulations that we know the exact true values for
each of the different parameters and coefficients. Clearly we must make some assumptions
in order to make a tractable model of a complex event. However, some of these assumptions
are more onerous than others. If we make a slight error in estimating the maximum patrol
duration for a guard, durK , or a slight error in estimating the effectiveness parameter of a
guard, βk , (which represents the proportion of enemy flow intersecting the guard’s location
is captured), it probably will not have drastic effects on the solutions for the sensor and
guard locations. We can also conduct a sensitivity analysis on these parameters to further
understand their effects.
While perturbations in most of the parameters have little overall affect on our formulations,
an error in estimating the enemy flows could have drastic effects. The objective function
95
hinges on the ability of positioning guards on enemy paths, based on these flows, f pt . This
is a general problem for many military applications of operations research because of the
very stochastic environment where estimates of enemy performance and actions are highly
uncertain. Consequently, we need some method of accounting for this uncertainty. Using
the most likely value for a coefficient, as we did previously in the deterministic formulations, is a good starting point, but the solutions to deterministic formulations are sometimes
brittle. Because of the number of variables and the size of the feasible space, an optimal
solution can be very specific to the parameters and coefficients used in the formulation.
Small perturbations in these coefficients and parameters can have large effects on the decision variables and the resulting real-world actions. These changes typically impact the
formulation in one of two, not mutually exclusive, ways. First, when the realizations of the
coefficients and parameters are considered, the solution to the formulation may turn out to
be a sub-optimal solution to the problem. Second, the solution to the formulation may turn
out to be completely infeasible.
One approach to protecting against this uncertainty when using a MIP, is robust optimization, which protects against possible changes in coefficients by solving for the optimal
value that remains feasible for a set of coefficient values instead of a single, nominal value.
In this method, the final answer is optimal for all possible values of the coefficients inside
the uncertainty set, which usually means a loss of optimality when compared with the nominal values, but a large increase in the amount of time that the solution remains feasible.
This method does not require (or use) a probability distribution on the set of considered
values, but rather considers any value in the range given. This approach remains tractable
for large problems, and with some techniques the problem remains in its original form - for
example, a MIP becomes a robust MIP.
5.2
Robust Literature Review
Robust optimization generally attempts to capture the details of possible perturbations in
an uncertainty set, which contains the possible values. Work in this type of optimization
started with Soyster, who introduced a method that captured the worst case outcome based
on a collection of uncertainty sets within a problem, Soyster (1973). Additional work expanded this concept to account for techniques where the modeler could control some level
of robustness in the model, and not rely exclusively on checking the worst case outcome.
Ben-Tal and Nemirovski, along with El Ghaoui, developed a technique that uses ellipsoidal
uncertainty sets which allows for the formulation to account for an overall limit within
96
an uncertainty set based on an accumulated distance from the nominal value to the ellipsoidal boundary. See Ben-Tal and Nemirovski (1998, 2000); Ghaoui et al. (1998). This
method alters the complexity of the underlying formulation, and a linear program when
transformed with robust ellipsoidal uncertainty becomes a second order cone problem. Another method of controlling for uncertainty was developed by Bertsimas and Sim, and can
take many forms, including limiting the total uncertain deviations in the coefficients, or by
limiting the number of coefficients within an uncertainty set that can vary. See Bertsimas
and Sim (2004); Bertsimas et al. (2011). This method allows for control over the amount of
uncertainty considered, but allows the formulation to retain its original complexity, where
a linear program with robust polyhedral uncertainty is still a linear program.
Some military applications have been studied using robust optimization with polyhedral
uncertainty. These applications include a mission planning tool for Unmanned Aerial Vehicles, Sakamoto (2006), operational planning Bryant (2006), and reconnaissance asset
allocation Culver (2013).
5.3
Robust Sensor Placement (R-DSP)
We outline here a robust sensor placement formulation since a robust approach to patrol
scheduling is analogous, and just a simplification of this formulation. The intent is to get
solutions for the sensor locations and guard locations over time that are close to optimal for
a range of possible enemy flows.
We previously discussed the two primary benefits of a robust approach: ensuring that the
solution remains feasible for perturbed coefficients, and that the feasible solution is the
best possible solution for the set of coefficients considered. Much of the robust literature
highlights the importance of a robust approach when dealing with hard constraints - the
ones where infeasibility is catastrophic. For example, in a manufacturing context with a
budgetary constraint where the optimal solution results in an over-budget process once certain cost parameters are realized, the result is catastrophic to the manufacturing company.
This type of robust approach is equally important in a military context. The importance of
addressing uncertainty for these hard constraints was addressed in well in Culver (2013),
where the amount of risk that a unit is exposed to must be managed, but the measurements
are uncertain.
We could evaluate similar concerns by testing the importance of robustness when estimating friendly and enemy speeds (which could be a substitute for varying road conditions)
97
or patrol durations. We expect the results to yield similar results, with an increase in the
feasibility coming in tandem with a slight decrease in optimality. But because these constraints in our problem are not as fixed, we focus instead on the most uncertain coefficients
in the formulation. We apply robustness to the enemy flows since that constitutes the crux
of the formulation, and also represents the coefficients with the most uncertain measurements. If the robust optimization approach assists us in creating a decision support tool that
addresses uncertainty in the enemy evaluation, then it is much more realistic that it could
be implemented in an operational context. We proceed focusing on the uncertainty in the
enemy flows.
5.3.1
Robust Formulation Derivation
In general, there are two solution methods for robust problems, either cutting planes or
a reformulation. Because we are searching for a formulation that solves in a reasonable
amount of time, but not conducting an exact comparison of the two techniques, we focus
here in the reformulation. We can use linear programming duality to transform a MIP
with an uncertainty set into a new MIP that accounts for all realizations of our uncertain
parameters in the uncertainty set. For details on this procedures, see Bertsimas and Sim
(2004); Bertsimas et al. (2011). The key notion of this construct is that for any possible
solution, the solver will have to consider the worst possible realization of the uncertainty
for that solution. In essence, “nature plays second”, and the formulation considers the worst
outcome that could realize in nature for a fixed solution. For our problem, we are therefore
solving:
max
min
y
f p ∈Uncertainty
∑∑
f pt y pt
(5.3.1)
t p∈P
Where we have an inner minimization problem that we reformulate into the robust counterpart formulation below.
5.3.2
Polyhedral Uncertainty Sets
For this formulation, we focus on implementing a polyhedral uncertainty set, as introduced
in (Bertsimas and Sim, 2004). The intent is to replace the fixed value enemy flows in
98
the existing formulation with a set of flows that reasonably captures the likely uncertainty
inherent in the evaluation of enemy forces. We do not bound the set with the absolute
extremes - the goal is to capture reasonable outcomes as opposed to all possible outcomes.
This technique is not probabilistic. We consider all elements within the uncertainty set as
possible, and do not assign a probability distribution to the uncertainty set. This reinforces
the notion of forming the set based on reasonable uncertainty, and not absolute extremes.
This uncertainty set is motivated by the Central Limit Theorem, where we bound the total
amount of variability allowed in the formulation since we expect an increase in the flows on
one path might be generally offset by decreases in a different path. Consequently, we can
define a somewhat ’smaller’ uncertainty set than one that accounts for every path deviating
in one direction at the same time.
To create the uncertainty set, we define two equations. First, we now want to treat the
enemy flows, f p,t , as uncertain, and to define lower and upper bounds on those flows.
Lower Bound ≤ f pt ≤ U pper Bound
∀p,t
(5.3.2)
Additionally, we know that is is extremely unlikely to be wrong about all of the enemy
flows at the same time. We therefore want a parameter in the formulation that can put a
ceiling on the aggregate amount of deviations for the flows on all the paths for any time
period. This controls limits the total amount of error in the flow estimations considered by
the formulation. Of particular use is that we do not specify which flows might vary, but
create the robust formulation to account for the worst possible combination of deviations
for any given solution.
∑ (Flow Deviation pt ) ≤ Ceiling
∀t
(5.3.3)
p∈P
As an example, Figure 5.3.1, illustrates the difference in what flow values we consider between a nominal problem and a robust problem. The robust solution, while it may have
a slightly lower objective function because it considers many possible flow values, gives
us a solution that is good for any realization of flow values within the set depicted in the
gray area. If we cap the total amount of deviation considered as in equation (5.3.3), then
the we can control the amount of “gray area” in the set that we include in our solution.
99
Because the robust formulation accounts for the worst possible outcome within the uncertainty set, we know that our solution will be protected against the worst case realization of
flow deviations.
Figure 5.3.1: Nominal vs. Robust Flow Values: An example sketch of the difference between solving for a single value (left) and for a range of possible values (right), where the
Ceiling parameter controls for the amount of gray area considered in the solution
Before detailing the specifics of the uncertainty set, we first define some additional terminology.
p∈P
f p,t
f¯pt
fˆpt
Paths for Origin-Destination pairs in the network that
represent all the possible options for enemy travel across
the border
The true traffic flow on path p at time t
Our estimate of the mean traffic flow; the nominal value
used in the deterministic formulation
The estimated half-length of the uncertainty for f p,t . We
consider twice this length as the range for the possible flow
incorporated in the formulation
We can now formally write equation 5.3.2 as:
| f pt − f¯pt |
≤1:
fˆpt
We can now formally write equation 5.3.3 as:
100
∀p,t
(5.3.4)
| f pt − f¯pt |
≤Γ
fˆpt
p∈P
(5.3.5)
∑∑
t
Our uncertainty set, U, is now:
(
U:
5.3.3
| f pt − f¯pt |
∑ ∑ fˆpt ≤ Γ;
t p∈P
| f pt − f¯pt |
≤1
fˆpt
)
∀p,t
(5.3.6)
New Objective and Additional Constraints
To create the new formulation, we add the following variables to the previously explained
set in section 4.9.2.
q pt
v pt
h
Decision variable associated with the first robust constraint in U, 5.3.4
Decision variable associated with the first robust constraint in U, 5.3.4
Decision variable associated with the robust accumulation constraint in
U, 5.3.5
Additionally, we reformulate the same objective in terms of these new variables and U.
max
d,e,r,s,w,y,z,h,q,v
∑∑
t p∈P
f¯pt y pt − ∑ ∑ q pt − hΓ
(5.3.7)
t p∈P
The robust formulation also includes the addition of three constraints, and bounds on the
robust variables.
h + q pt ≥ fˆpt v pt
y pt ≤ v pt
y pt ≥ −v pt
q pt , h ≥ 0 ∀p,t;
∀p,t
∀p,t
(5.3.8)
(5.3.9)
∀p,t
(5.3.10)
v p,t : f ree ∀p,t
(5.3.11)
101
5.3.4
R-DSP Formulation
Combining all of the above new information, we can now reformulate our solution to the
“Determine Sensor Placements” function as follows.
O BJECTIVE F UNCTION
max
d,e,r,s,w,y,z,h,q,v
∑∑
t p∈P
f¯pt y pt − ∑ ∑ q pt − hΓ
C ONSTRAINTS
102
t p∈P
(5.3.12)
zk j0 : given ∀k
∑∑ ∑
t
zk jt = 0
(5.3.13)
∑
si = 0
(5.3.14)
∑ zk jt = 1
∀k,t
(5.3.15)
k j∈O,D
i∈O,D
j
zk jt ≤ zk, j,t−1 +
zk,i,t−1
∑
∀k, j,t
(5.3.16)
i:δi j ≤speedk
t+durk +1
∑ ∑ zk, j,m ≥ ∑ zk, j,t − ∑ zk, j,t+1
m=t+2 j∈B
j∈B
∀k,t < T − durk
(5.3.17)
j∈B
t+re f itk
∑ ∑ zk, j,m ≤ durk ∑ zk, j,t + durk (1 − ∑ zk, j,t+1)
m=t+2 j6∈B
j∈B
∀k,t < T − 1
j∈B
(5.3.18)
ek jt ≤ 1 − θ
∑ zm, j,t−1
∀k, j,t > 0
(5.3.19)
m6=k
ek jt ≤ zk jt
∀k, j,t
(5.3.20)
∑ si ≤ p
(5.3.21)
i
wik jt ≤ si
∀i, k, j,t
wik jt ≤ zk jt
rklt ≤
(5.3.22)
∀i, k, j,t
∑
∑
(5.3.23)
wi,k, j,t
∀k, l,t
(5.3.24)
i∈l + j∈Reach(i,l)
d pt ≤ ∑ ∑ rk, j,t
∀p,t
(5.3.25)
k j∈p
d pt ≤ ∑ si
∀p,t
(5.3.26)
i∈p
y pt ∑ ∑ (ek, j,t ) + d p,t
∀p,t
(5.3.27)
k j∈p
y pt ≤ α + ∑ ∑ βk (ek jt ) + d p,t
∀p,t
(5.3.28)
k j∈p
h + q pt ≥ fˆpt v pt
y pt ≤ v pt
y pt ≥ −v pt
y pt ∈ [0, 1] ∀p,t;
zk jt ∈ {0, 1} ∀k, j,t;
si ∈ {0, 1} ∀i;
q, h ≥ 0 ∀p,t;
∀p,t
(5.3.29)
∀p,t
(5.3.30)
∀p,t
(5.3.31)
d pt ∈ [0, 1] ∀p,t;
ek jt ∈ [0, 1] ∀k, j,t;
(5.3.32)
rklt ∈ {0, 1} ∀k, l,t;
wik jt ∈ {0, 1} ∀i, k, j,t;
103
v : f ree ∀p,t
(5.3.33)
(5.3.34)
C ONSTRAINT EXPLANATIONS
(5.3.13)
(5.3.14)
(5.3.15)
(5.3.16)
(5.3.17)
(5.3.18)
(5.3.19,5.3.20)
(5.3.21)
(5.3.22,5.3.23)
(5.3.24)
(5.3.25,5.3.26)
(5.3.27)
(5.3.28)
(5.3.29,5.3.30,5.3.31)
The initial guard locations are known ahead of time, and serve as the
initializing conditions for the patrol.
No guards can patrol on the origin nodes because they are in the
neighboring country. Additionally, no guards can patrol on the sink
nodes because they represent the limiting location where no further
interdiction can happen. Likewise for sensors.
Guards can only be assigned to one place at a time.
Future guard locations are restricted to locations that the guard can
reach within a time period based on the guards’ speed.
If a guard is on a base at time t, and on a patrol at time t + 1, it must
return to base prior to its maximum patrol duration in order to refit.
Upon returning from a patrol, a guard must stay on base long enough
to refit.
The effectiveness factor is below 1 for guard k at node j, when a
different guard was at node j at t − 1. This accounts for a decrease in
effectiveness due to transitioning guards on the same node.
The sensors are limited to the quantity on hand.
The construction of a composite variable, w, based on sensor and guard
locations
Indicator for which nodes a guard and sensor combination provide
extended reach
If there is a node with extended reach coverage is on path p at time t,
then the extended reach capture factor, d, can take a value greater than
0.
If a guard is on path p at time t, or has extended reach to path p, then
the capture factor, y, can take a value greater than 0.
The capture factor increases linearly with the number of units on the
path. This represents an increased ability to capture traffic based on
having multiple guards.
Additional constraints related to the robust reformulation of the MIP
The robust approach to the “Patrol Scheduling” function is formulated in a similar manner
and includes the addition of the same variables and constraints, and the same new objective
function. Next, we consider the computational results for the different models.
104
Chapter 6
Results and Analysis
We now proceed with numerical tests of our formulations. In this chapter, we focus our
analysis on the “Determine Sensor Placements” function, since that is the most computationally complex of the formulations, and specifically consider the robust version of the
model, R-DSP. Tractability and solution quality for this mode, R-DSP, imply similar results
for the other, smaller models. We will expand on more of the results in the Operational
Evaluation section.
This chapter begins with an outline of the test structure, including the scenario that we
use and the details of our data generation. We then describe the tractability of the models,
followed by a description of the types of results that we get with the DSP model. Finally,
we discuss in detail the results of the R-DSP formulation, and describe the utility of the
robust approach.
6.1
6.1.1
Test Structure
Scenario
To test the different models, we create a network graph that is representative of a possible border scenario. Building on operational experience, as opposed to a specific pair of
countries, we construct a network that represents a border scenario in a relatively open area
where roads and trails crossing a border connect Country B (where enemy forces refit) to
Country A (which friendly forces are securing) into a larger highway running parallel to
105
the border inside the country of interest. This scenario is sketched in Figure 6.1.1. This
sketch represents a region is approximately 10 kilometers by 40 kilometers. Because of the
vast differences in the number of forces employed in different types of areas, the size of an
area could represent the border security responsibilities for a company, battalion or brigade
size element depending on a host of operational factors. We proceed by considering it in a
similar manner to the example outlined in Figure 2.4.1, where a brigade allocates only two
patrolling elements as border guards on a regular basis, with only occasional changes.
Figure 6.1.1: Test Scenario: A sketch of a representative border scenario with multiple
crossing points and roads connecting to a larger highway inside the country of concern.
We then construct this representative scenario as a network of nodes and edges to use in our
formulation. The resulting graph, shown in Figure 6.1.2, includes 91 nodes with 143 edges,
where we use 4 nodes in Country B as Origin nodes where the enemy traffic originates, and
4 nodes in Country A as Destination nodes that represent when enemy forces have started
traveling down the main highway and have the possibility of distinguishing enemy forces
from the local populace and capturing them becomes much more unlikely.
To test this formulation, we set parameters values within a range that are representative of
actual forces in terms of patrol duration, refit ability, and speed. We initially experiment
with scheduling patrols for one day at a time while determining the optimal sensor locations. This basic level of testing includes guards that have a patrol duration of 24 hours,
it increments the guard taskings in two hour blocks. We test the scenario with two guard
speeds, one representing a motorized force on degraded roads (approximately 15 kilometers
per hour), and one representing a primarily dismounted force (approximately 7 kilometers
per hour).
106
Figure 6.1.2: Test Scenario as a Network: The network that we use for the initial testing
of our formulation
6.1.2
Data Generation
To test the formulations, we also create likely scenarios for enemy flows. To do this, we
establish two types of enemy traffic flows. Of note, the emphasis for the numerical values
for the flows is on their relative values, and not the absolute values since the formulation
solves for the maximum flow capture given a certain set of parameters.
Flow Name
Uniform
Key Paths
Flow Description
Flows are randomly drawn from the same range for all paths in the
network.
Flows are randomly drawn from a range of small values for most paths,
with a couple of key paths with larger flows representing the enemy’s
primary paths.
Table 6.1.1: Flow Types: The different types of flows used in initially in the non-robust
simulations
6.2
Tractability Analysis
We presented four non-robust models - a mixed integer formulation for basic patrol scheduling (B-PS), a mixed integer formulation that included sensor placements as a decision
(DSP), a mixed integer formulation that included the sensors locations a priori (E-PS), and
a greedy heuristic for solving a condensed version of the basic scheduling function (DR).
We also introduced a robust extension to the DSP model (R-DSP). The DSP model is the
largest, and the following versions are effectively subset problems of it. Consequently, we
107
demonstrate tractability results only for DSP, since acceptable run times for it will indicate
acceptable run times for the other models.
We view tractability not from a computational complexity standpoint, but from a practical solvability standpoint. For example, the DR algorithm requires an almost immediate
response, hence it is not an integer programming formulation, and we cap the considered
region of the network for our algorithm. The “Patrol Scheduling” models, B-PS and EPS, require relatively quick solution times so that a staff could iterate through a variety
of options, but solution times less than ten minutes would be completely reasonable. The
“Determine Sensor Placements” model occurs at more infrequent intervals than the other
formulations and less rapid solving is acceptable. Solutions on the order of two hours are
still reasonable for a staff conducting planning for the sensor emplacements that will serve
them for the next couple of months.
To test the solutions, we used the commercial solver Gurobi called from an interface in
Python. The code ran on a department computer that had eight cores (2.8 GHz), 8 GB
cache, and 16 GB of RAM.
Figure 6.2.1: Solution Times: The solution times for different combinations of guards
(lines) and sensors (x-axis) in seconds (y-axis) for the DSP model
After many different iterations of the “Determine Sensor Placement” function (the largest
of the models involved), we determined that the main factor affecting tractability was the
number of sensors involved. More sensors results in many additional variables, both the indicator variables for the sensors and the composite variables that are needed to capture the
108
extended reach that the sensors provide. For the largest combination tested here, 3 guards
and 5 sensors, the calculation takes less than an hour. The results for various combinations
are displayed in Figure 6.2.1. Of note, the solution time with no sensors is almost negligible, which is generally the result that we get for the B-PS and E-PS models, since neither
includes sensors. Because the robust version retains the model power of the original, the
R-DSP model takes similar times to the DSP model.
This means that the different models are definitely practical for implementation in a decision support tool. A staff could run the DSP model for the “Determine Sensor Placements”
function whenever they needed to consider emplacing new sensors or moving existing sensors with results in a reasonable amount of time (less than an hour). This would provide
plenty of time for a staff that is considering the moves infrequently, and in a very deliberate,
methodical manner. A staff could run the E-PS model for the “Patrol Scheduling” formulation iteratively during a planning process with almost real-time results (less than a minute).
This provides the flexibility for a staff to easily consider many different options. The DR
algorithm for the “Dynamic Retasking” function also runs in real-time, which means that
it could be successfully used to generate immediate retasking orders for patrols conducting
interdiction operations.
6.3
Overall Results for the DSP Model
Generally, the DSP model outputs a patrol schedule, along with a list of the nodes that
need sensors for optimal performance. As we compare the performance of the formulation
for different numbers of sensors, we see solutions that have the basic characteristics that
we expect - including monotonicity and a decreasing marginal improvement from each
additional sensor given a fixed allocation of guards. Both of these features can be seen in
Figure 6.3.1, which illustrates the percent of the enemy flow captured with one guard for
different sensor allocations on the test network.
One quality of this formulation is that it allows us to compare tradeoffs between the number
of guards and the number of sensors involved. This is useful for the planning staff when
understanding how many guards to allocate to the border interdiction problem compared
with other missions, and for understanding when it is useful to attempt to acquire additional
sensors from their higher headquarters. An illustration of the different levels of effectiveness for different combinations of guards and sensors can be seen using a heatmap, where
the color transitions from blue to red as the percent of enemy flow captured increases.
The effects from additional guards can be seen by moving up the y-axis, and the effects
109
Figure 6.3.1: Marginal Utility of Sensors: The percent of flow captured for a fixed quantity
of guards and different numbers of sensors
from additional sensors can be seen by moving right along the x-axis. This type of comparison also allows a planning staff to consider tradeoffs between allocating guards, and
intelligently emplacing sensors, where additional sensors might mean fewer guards were
required. An example of this type of comparison can be seen in .
Figure 6.3.2: The Impact of Guards and Sensors: Percent captured for different combinations of guards and sensors as a way to compare tradeoffs
110
For a given topology, one of the key parameters that affects the importance of sensors is
guard speed. With no sensors, a slow guard and a fast guard capture roughly the same
amount of enemy traffic, as seen in Figure 6.3.3. However, as more sensors are allocated
(moving right across the x-axis), the fast guard has the larger improvement. The fast guard
benefits more from additional sensors because the area over which he can respond to a sensor detection is larger, because of his increased speed, and consequently there are additional
useful places for sensors. Similar benefits can be seen with multiple employed guards.
Figure 6.3.3: The Impact of Guard Speed: Percent captured for a fast and slow guard for
different numbers of sensors
6.4
Robust Results
To demonstrate the effects of the robust optimization, we describe our methodology for
testing the robust formulation, R-DSP, and then illustrate four different experiments. Our
methodology includes how we select the flow values and the uncertainty set half-lengths,
along with how we simulate flows during the test. Our four experiments highlight different
aspects of the robust performance.
111
Experiment
1
2
3
4
# of Guards
2
2
2
2
# of Sensors
4
2
2
Vary
Flow Type
Zero-Anchored
Uniform Draw
Key Paths
Uniform
Table 6.4.1: Robust Experiments: A summary of the different robust experiments conducted with flow type explanations found in table 6.4.2
6.4.1
Methodology
To determine the utility of the robust problem, we consider the same medium network
as before, and solve for the sensor placement and approximated guard schedule from the
“Determine Sensor Placements” formulation for a variety of robust levels. In particular, we
consider various Γ values across a range that considers a completely deterministic solution
(Γ = 0) to one that considers uncertainty on every path. Our intuition was that for certain
types of flows, the deterministic solution would be the optimal choice only for the exact
nominal flow values, and that any deviation from nominal for those flow values would lead
to the robust solution being the better choice.
To account for simulating uncertain half-lengths for each of the flows, we update our descriptions of the two types of flows considered above, and add a third to capture the utility
of the uncertainty set.
Flow Name
Uniform Draw
Key Paths
Zero-Anchored
Flow and Uncertainty Description
The flows and uncertain half-lengths for every path are drawn
uniformly from the same range of values.
The flows and uncertain half-lengths for most paths are drawn
uniformly from the same, small range of values. The flows and
uncertain half-lengths for a small subset of paths are drawn uniformly
from a larger range of values. This mimics a situation where certain
paths are expected to have more enemy traffic at times, but that
estimation also has greater uncertainty.
The flows for every path are drawn uniformly from the same range of
values, but a larger range than the Uniform Draw. This induces some
aspects of a small number of key paths. The uncertain half-lengths are
equal to the flows to create a situation where there is always the
possibility that no flow will travel on a certain path. This captures the
realism of not having a certain, finite floor on the possible enemy
traffic on a certain path.
Table 6.4.2: Flow Types: The different types of flows used in simulations
112
Of these three types, the “Zero-Anchored” method of generating flows is the most realistic
because it allows for the possibility of any path to have zero flow during a certain time
window, which mirrors the uncertainty present in understanding enemy infiltrations.
Figure 6.4.1: Simulated Flow Constructs: Four different ways of simulating the uncertain
flows as compared to the uncertainty set used in the formulation. The gray intervals represent the uncertainty sets used for certain nominal values (black lines at the mid-point of the
gray intervals). These base gray intervals are the same for all four simulation constructs.
The red intervals represent the simulation interval used with random draws uniformly from
within the red interval.
To evaluate the effects of a robust solution, we simulate uncertain flow values in a variety
of ways. We construct the uncertainty set as a range of values for each path, with the nominal value at the mid-point. This set is a reasonable approximation, but not all-inclusive
of possible values. Consequently, we simulate uncertain flows from a variety of different
constructs so that we can see the comparison in performance between solutions with different levels of robustness. For each of the flow types that are used in the formulation and
113
solver, we can vary the simulation that we consider. Specifically, we consider four simulation constructs that can each be applied to any of the flow types. These simulation types
are described in table 6.4.3, and depicted in Figure 6.4.1.
Simulation Name
Baseline
Random Half High
Large Uncertainty - High
Large Uncertainty - Low
Simulation Description
Flow values drawn randomly for the full uncertainty set
considered in the formulation
Half the flow values skew high. For half of the flow values,
the simulated value is drawn randomly from the the lower
half-length. For the other half, it is drawn randomly from
the upper half length and an additional half length above
the high-end of the uncertainty set for that path. This
allows for some flow values that the formulation did not
consider.
The flow values with large uncertainty skew high. For the
smaller half-lengths (less uncertainty), the simulated flow
values is drawn randomly from the lower half-length. For
the larger half-lengths (more uncertainty), the simulated
flow value is drawn randomly for the upper half-length and
an additional half length above the high end of the
uncertainty set for that path. This allows for some flow
values that the formulation did not consider.
The flow values with large uncertainty skew low. For the
larger half-lengths (more uncertainty), the simulated flow
values is drawn randomly from the lower half-length. For
the smaller half-lengths (less uncertainty), the simulated
flow value is drawn randomly for the upper half-length and
an additional half length above the high end of the
uncertainty set for that path. This allows for some flow
values that the formulation did not consider.
Table 6.4.3: Simulation Descriptions: The different types of realizations for the uncertain
flows
6.4.2
Robust Experiment 1
We can now use these different types of simulations to test the utility of the robust solutions
found using R-DSP. The most realistic flow type that we consider is a Zero-Anchored since
it accounts for the possibility of capturing nothing on any of the given paths and has a wide
114
enough range to allow for significant differences in nominal values between paths, which
has some aspects of the Key Paths flow type. We solved for the solution under various Γ
values for 2 guards and 4 sensors in the test network. The solution for these formulations
was exposed to the four types of simulations above.
To compare the results of the different levels of robustness, we first determined which of
the Γ settings yielded unique solutions. In this case, we consider the nominal solution and
five different robust solutions, each with a different level of protection. To compare them,
we plot the histograms for the percent of enemy flow captured (our objective) for each of
the simulation types considered. Our results for the 2 guard, 4 sensor, Zero-Anchored flows
are shown in Figure 6.4.2.
Figure 6.4.2: Simulation Results for Varying Levels of Robustness: 2 guards, 4 sensors,
and a Zero-Anchored flow type under four different types of simulated flows
Of note in these results is that a robust solution under Γ = 2 is better than the deterministic
in almost every realization. Even under Baseline simulation (with a range from just the
uncertainty set considered in the formulation), the robust solution outperforms the nominal
solution. When random realizations occur on the high end of the flow sets, the robust solution is preferable. Of particular note, when the flow values with large uncertainties realize
on the high end and beyond the uncertainty set considered (Large Uncertainty - High), the
robust solution is better. This means that the robust solution is better than the deterministic
when our model of the uncertainty set was incorrect and larger flows in absolute terms are
crossing the border. The only solution where the nominal outperforms the robust is when
the larger uncertainties realize on the lower end. This is also when the model of the uncertainty set was incorrect, but happens when the absolute number of enemy forces crossing
115
the border is lower. Considering all of these results, we would select the robust solution
with Γ = 2.
In terms of robust modeling, it is particularly important to consider different simulations
and robust levels to determine the best level of protection. A Γ = 10 value, while robust,
has so much additional robust protection that it ends up being too conservative to be worth
selecting.
While these results are the most promising in terms of robust considerations, we include
two other examples that show cases where the robust considerations do not prove worthwhile in most cases. Critically here though, is the notion that the Zero-Anchored flow type
is the most realistic consideration, and the quantity of guards and sensors is realistic for a
task force sized element.
6.4.3
Robust Experiment 2
We show the results here for a scenario with 2 guards and 2 sensors with a Uniform Draw
flow type. This means that for almost every path, there is always the possibility of capturing
some enemy traffic. This formulation results in three unique solutions under the range
of protection levels that we considered. The results for this simulation are depicted in
Figure 6.4.3. In this scenario, the robust solution only outperforms the nominal solution
when the flows larger uncertainties realize on the low end of their uncertain ranges. This
is a worthwhile consideration for a decision maker, but probably not enough to make the
use of a robust formulation useful. We obtained similar results for 2 guards and 2 sensors
under the Zero-Anchored flow type.
6.4.4
Robust Experiment 3
Next, we consider a scenario with 2 guards and 2 sensors with a Key Paths flow type. In this
case, we considered three paths as having much high nominal flow values along with much
larger uncertain ranges. Again in this case, the uncertain ranges are not zero-anchored, so
for almost every path, there is always the possibility of capturing some enemy traffic. This
formulation results in three unique solutions under the range of protection levels that we
considered. The results for this simulation are depicted in Figure 6.4.4. In this scenario, the
robust solution only outperforms the nominal solution when the flows larger uncertainties
realize on the low end of their uncertain ranges. This is perhaps more useful in this case
116
Figure 6.4.3: Simulation Results for Varying Levels of Robustness: 2 guards, 2 sensors,
and a Uniform Draw flow type under four different types of simulated flows
than in the Uniform Draw flow type. In this case, if the decision makers want to consider
the possibility of large flow values on the key paths, but do not find it likely, they might
consider the tradeoff that comes from using robust protection in Large Uncertainty - Low
versus the case where large amounts of traffic cross on the key paths.
6.4.5
Robust Experiment 4
Clearly there is some distinction as to when the robust formulation proves valuable. To
determine this, we conducted a series of simulations on a formulation with 2 guards and
various sensor quantities. As described in table 6.4.4, the quantity of sensors involved in
the formulation has a large impact on the utility of the robust solution. The table shows, for
different numbers of sensors, the expected percent captured from solving the MIP deterministically, from simulating the deterministic answer under the Baseline simulation type,
and for simulating the best robust solution under the Baseline simulation type. These results hold to varying degrees for other simulation types as well. Of note is the difference
in the values on each row between the nominal solution under simulation and the robust
solution under simulation. For very low quantities of sensors, the deterministic solution
outperforms the robust solution most likely because the deterministic guard and sensor
configuration is relatively stable, and not fragile. As the number of sensors increases, the
deterministic solution becomes more fragile, and the robust solution outperforms the deter117
Figure 6.4.4: Simulation Results for Varying Levels of Robustness: 2 guards, 2 sensors,
and a Key Paths flow type under four different types of simulated flows
ministic solution even under very basic simulation. Then, as the number of sensors reaches
a saturation point, where based on guard speeds and the topology there are more sensors
than can be effectively employed to distinctly improved the “extended reach” of a patrol,
the deterministic solution begins to perform better. This is because there are enough sensors
to make the deterministic solution less fragile once again.
# of Sensors
0
1
2
3
4
5
6
7
MIP Solutions
27.9
35.1
40.5
47.5
52
56.2
60.6
62.4
Nominal (Simulation)
27.9
33
38.1
38.5
38
39.8
39.9
45.2
Robust (Simulation)
27.7
30.6
31.8
44.3
47.6
43.1
45.7
43.8
Table 6.4.4: The Effect of Sensor Quantity on Robust Performance: Comparing percent of
enemy traffic captured for the MIP solution, nominal solution under simulation and robust
solution under uncertainty
This indicates that for a certain number of employed guards, there is a range of utilized
sensors where the robust solution provides better results. Additionally, we can see that
118
some of the marginal gain in percent captured from placing a sensor, that we expected from
the MIP solution, is not realized under the Baseline simulation, but the specifics vary based
on the simulation type considered.
6.4.6
Robust Conclusions
We conclude based on these experiments that the robust formulation has distinct value for
our different functions. In general, the flow type considered does not have a large effect
on when the robust solution is useful, which is promising, since it demonstrates that the
robust formulation is valuable in a number of different operational situations. Additionally,
we conclude that the value of the robust formulation varies with the number of sensors
available. For realistic numbers of sensors (resource constrained, but non-zero), the robust
formulation provides value. However, for very small or very large numbers of sensors, the
robust formulation does not provide value over the deterministic formulation.
We present additional considerations for the robust formulation in the next section, where
we consider the differences in the decisions made under the robust formulation versus the
nominal.
119
120
Chapter 7
Operational Evaluation
In addition to evaluating general characteristics of the modeling results as well as a simulated comparison of the robust performance, we evaluate the operational aspects of these
results. This evaluation has two parts. First, we compare the method with the methods
currently in use. This is a difficult comparison, as the current process is not founded on
an algorithmic decision tool, and so the comparison will necessitate some type of approximation of current military planning. Second, we show what the solutions mean in terms
of implementing the critical decision variables, along with an understanding of how the
implementable solutions differ between the nominal and robust solutions.
We proceed in this chapter with a description of a staff approximation algorithm and the
comparison of the algorithm to our analytic approach for both the placement of sensors and
the scheduling of patrols. We then illustrate what the operational solutions created by the
formulations would be during implementation. Finally, we discuss the factors that would
impact the operational employment of the model.
7.1
Test Scenarios - Real-world Parallels
As described in section 6.1, the scenario that we test is a realistic approximation of a battalion level border security situation measuring about 10 kilometers by 40 kilometers. The
scenario represents a generally connected border region with many roads and trails that
connect through hubs between the border and the main thoroughfare which represents that
in-country boundary of the border region. These hubs can generally be viewed as small
villages or main traveling points that include numerous intersecting roads. We deliberately
avoid a specific international border region to retain a more general focus.
121
7.2
Operational Model Evaluation
In this section we focus on comparing our decision support tool the current military staff
method of determining the sensor placement and patrol schedule. Specifically, we compare
the DSP and R-DSP models to an approximation of the current staff process. The current
process is generally not as structured as our method and it is dependent on the individual
planners conducting the analysis. Our main method for conducting this comparison is to
explore the differences in the objective value, the percent of enemy captured, for the current
process and our method.
Before we present this comparison, we first compare the methods in terms of using the
sensors to reduce uncertainty in the network. The sensor emplacement process currently
employed is very individualized, and a planner might have his or her own view of how best
to place sensors. The purpose could be gaining information about an area, as described in
section 4.9, and less about extending the reach of patrolling units. As described previously,
this learning process is very difficult to quantify. We consider reducing uncertainty in the
system as a proxy for learning about an area since no set definition of learning exists in this
context.
Because of this, before we show the overall comparison, we first compare our method to
a analytical method of reducing uncertainty that a staff could employ if they had access to
the synthesized data from an “Analysis of Sensor Data” function. A staff might choose to
do this if they lacked a dynamic retasking tool and did not have a plan for an overall sensor
emplacement strategy that combined with other interdiction efforts. This difference necessitates two different comparison metrics - one based on learning and reducing uncertainty
and one based on magnifying the reach of active patrols.
7.2.1
Staff Approximation Algorithm for Interdiction
A approximation of a how a staff could conduct sensor placement with a learning objective
is to assign sensors to the locations with the highest level of uncertainty. In this sense, the
long-term goal of the headquarters is to reduce the uncertainty in the system. We therefore
create a greedy heuristic that places sensors in the locations that have the highest nodal
uncertainty based on the formulation that we use. This method uses the analytic framework
that we create (in order to quantify uncertainty), even though in practice, no such methods
exist. This comparison is therefore best viewed as an ideal version of what a staff could
do for reducing quantitative uncertainty if they had access to the refined data that a fully
122
functioning border interdiction system could provide. In terms of a comparison, this means
that this method is an upper bound on what a staff could produce.
We define the nodal uncertainty metric as follows, where S in the set of paths that travel
through node j. This metric is the percent of the total uncertainty that travels through a
node that has a sensor. With no sensors present, the metric equals 0, and with sensors on
every path, the metric would equal 100. fˆpt is the half-length of the uncertainty set, which
is the measure of uncertainty in the system.
∑
N=
∑ ∑ fˆpt
j∈Sensors p∈S t
∑
∑ ∑ fˆpt
∗ 100
(7.2.1)
j∈Sensors p∈Paths t
The staff approximation algorithm then selects the nodes that produce the highest value of
N for a certain number of sensors using a sorted list of all the total uncertainty at every
node in the network.
The scheduling process is also less structured. However, a characteristic of current scheduling is that staffs will combine the knowledge of the most likely place that might have a
crossing with considerations on patrolling in a variety of different places. To create this
approximation we therefore consider a scheduling approximation that is a greedy heuristic
for selecting the nodes with the largest expected flow as the destinations for the patrols. We
define the total flow G similarly to the Nodal Uncertainty, N.
∑
G=
∑ ∑ f pt
j∈Sensors p∈S t
∑
∑ ∑ f pt
∗ 100
(7.2.2)
j∈Sensors p∈Paths t
After selecting the goal destination node for the patrol, the algorithm tasks the patrol to
get there on the shortest path available. The algorithm includes a feature to approximate
the problem of cannibalized flows, so that guards do not attempt to capture the same traffic
from nearby nodes. To do this, the algorithm prevents the goal nodes from the sorting
algorithm on G from being closer than 10 distances units. As a function of the current
topology, this ensures that guards are “reasonably” spaced and not on the same path. This
is a good approximation of how a planning staff would space out guards that are employed
at the same time.
123
7.2.2
As-is v. Analytical Model Performance
To compare these results, we consider two aspects. First, and of secondary importance,
we compare the results of sensor placement for our formulations against the staff approximation method to see if there are differences in how the sensors could reduce uncertainty
over time. Placing sensors at nodes as currently done could lead to a reduced amount of
uncertainty about a specific node, but will not reduce the uncertainty about other nodes, or
more specifically, the associated paths. This was the primary reason that without a formal
“Analysis of Sensor Data” function we implemented the “Determine Sensor Placement”
function based on the concept of extended reach. Consequently, we use a metric of nodal
uncertainty to compare the differences between the two methods for reducing long term
uncertainty. The staff approximation algorithm can be seen as the optimal solution for this
metric, since it uses a sorting algorithm to select the nodes with the highest uncertainty.
Therefore, what we are comparing here is how our method, which does not incorporate this
aspect as a factor in sensor placement, compares.
As can be seen in table 7.2.1, the Determine Sensor Placements function is outperformed
by the staff algorithm, but not by an extremely large margin. Of note, the staff algorithm
is designed to produce the optimal answer under this metric, which gives a rough idea
for a method of reducing uncertainty over time. This means that the “Determine Sensor
Placements” function gives reasonable results even when compared using a metric it is not
designed to consider.
# of Sensors
0
1
2
3
4
5
6
7
Staff Algorithm
0
3.4
6.5
9.2
11.8
14.4
16.9
19.5
DSP Model
0
2.0
3.5
5.9
7.7
6.4
9.7
10.7
Table 7.2.1: Nodal Uncertainty (N) Comparison: A comparison of the nodal uncertainty
metric, N, for 2 guards and various numbers of sensors with both the analytic staff algorithm (optimal), and the Determine Sensor Placements function
The main comparison metric that we consider is how the staff approximation algorithm performs for interdicting enemy forces. This is the crux of the task for the border interdiction
task, and should serve as the primary comparison metric. Even though the “Dynamic Retasking” function does not exist in practice, we include in the staff approximation method
124
the ability to retask patrols and leverage the extended reach of the sensors. A comparison of
the staff approximation method to the our method when zero sensors are present provides
a benchmark of what happens without any incorporation of extended reach.
Some results for this comparison can be seen in table 7.2.2. With no sensors present (so
with no additional ability for extended reach), the DSP (nominal) and R-DSP (robust) models outperform the staff approximation algorithm by a total of 4 percent of the enemy flow,
which is an improvement of almost 20 percent. As the number of sensors is increased (in
this example with 2 guards present), the difference becomes even larger, which is a function of our formulation including a method for retasking guards, and including an explicit
ability to incorporate sensor location based on extended reach.
# of Guards
1
2
3
2
2
2
2
2
2
2
# of Sensors
0
0
0
1
2
3
4
5
6
7
DSP
16.1
27.9
38.9
33.0
38.1
38.5
38.0
39.8
39.9
45.2
R-DSP
16.1
27.7
38.7
30.6
31.8
44.3
47.6
43.1
45.7
43.8
Staff Approx
12.2
23.3
34.6
23.3
24.6
24.6
24.6
24.6
24.6
24.6
Margin
3.9
4.6
4.3
9.7
13.5
19.7
23.0
18.5
21.1
20.6
Table 7.2.2: Comparison of the DSP and R-DSP Models Under Simulation to the Staff
Approximation Algorithm: The percent of enemy flow captured for various guard and
sensor combinations under the nominal, robust and staff approximation methods with the
margin of improvement of the best formulation over the staff approximation
7.3
Guard and Sensor Placement Decisions
In this section we focus on the operational decisions about where sensors are guards are
located based on the analytical methods created. The intent is to show the operational
aspects of the decisions as opposed to a synthetic value of the percent of flow captured. We
focus on visualizing the implementation of the key decision variables.
125
7.3.1
Varying Levels of Sensors and Guards
To develop a better understanding of the utility of additional sensors, and how the guards
can be optimally positioned, we illustrate the locations of the guards and sensors in Figure 7.3.1 with four combinations: 2 guards and 0 sensors, 1 sensor, 3 sensors and 5 sensors.
We omit the travel locations for the guards, and illustrate the primary guard locations in
blue, the sensors in green and the base in orange.
Generally, the solutions focus in the same area (the left half of the network). There is little
overlap in sensor locations for different quantities of sensors. For example, the solution for
3 sensors is not the solution for 2 sensors plus an additional location. However, the sensor
locations focus emplacements in the same regions. This type of visualization is useful for
understanding the optimal locations for emplacing a certain number of sensors knowing
that the possibility exists for others. If the additional sensors are ready for emplacement
after many patrols (a month later for example), then the estimates of enemy actions may
have significantly changed, and the locations for the new sensors may be in a completely
different area. If however, the additional sensors are available very soon, then the an understanding of the different emplacement options between the current quantity of sensors
and the updated quantity after more arrive could influence the decision on where to place
sensors.
As the numbers of sensors increases, the guards’ tasked locations are farther from the border, which allows for more reaction time for the guards in response to sensor detections.
This matches our original intuition of how sensor placement could aid guard forces. Additionally, the resulting guard locations provides the benefit of a probable decrease in operational risk since the tasked locations are not as exposed to the border, and generally in
more supportable positions from the base.
7.3.2
Decisions for Different Levels of Robustness
We illustrate in Figure 7.3.2 a comparison of the nominal solution and the robust solution
for 2 guards and 4 sensors. For this example, the robust solution outperforms the nominal
solution. Additionally, we can see from the illustration that we get some benefits in terms
of operational employment, since the guard locations under the robust solution are closer
to the base (in this example), which has presumably less operational risk. The sensor
emplacement under the robust solution also has a slightly different configuration of sensors
with the sensors focused on areas slightly farther (laterally) from the base.
126
Figure 7.3.1: Optimal Guard and Sensor Locations: An illustration of the optimal locations for 2 guards and (top to bottom): 0 sensors, 1 sensor, 3 sensors and 5 sensors. The
guards’ primary locations are in blue, the sensors are in green and the guards’ base is in
orange.
127
Figure 7.3.2: Optimal Guard and Sensor Locations for a Robust Solution: An illustration
of the optimal locations for 2 guards and 4 sensors under the nominal formulation, and the
robust formulation (Γ = 2). The guards’ primary locations are in blue, the sensors are in
green and the guards’ base is in orange.
128
Chapter 8
Conclusion
8.1
Summary of Results
In this thesis, we provide an analytical approach to military border interdiction problems.
In chapter 2 we provide the background for the problem, with an overview of the needs for
tactical decision support tools in general, along with the other uses for the specific models
that we set out to create. We outline the basics of the problem, and provide details on the
sensors and guards that we consider. In chapter 3 we conduct a functional decomposition of
the border interdiction system, define the specifics of each function in the process, outline
the current, as-is process, and then detail the four decision-making functions that could
benefit the most from an analytical approach.
In chapter 4 we present four different models three of the functions considered, along with
an explanation of how we could use these models to evaluate different options as part of
evaluating past missions. In chapter 5 we introduce the robust extension to the model used
for the “Determine Sensor Placements”, and the robust approach could extend similarly for
the “Patrol Scheduling” function. This robust approach allows us to incorporate a degree
of enemy intelligence into the otherwise deterministic formulation. In chapter 6 we present
our computational results, with a description of the tractability involved, along with an
explanation of the basic outputs from the models. We also include a detailed description
of the results we get for the robust formulation. In chapter 7 we compare our models to
an algorithm that approximates the current staff planning process, and then describe the
results in terms of the resulting decision variables.
Overall, this thesis includes five different models which are summarized in table 8.1.1.
These provide tractable solutions to some of the decision making functions in the border
129
interdiction system, and our functional decomposition of that system provides avenues for
further research. Our chosen model structure provides the power to consider many different aspects of friendly and enemy forces, along with the ability to tailor details about the
mission-specific considerations. The robust extension that we provide allows for a tractable
way of dealing with the uncertainty inherent in the estimation of the enemy movement. Will
illustrate the method for determining when the robust approach will yield better results,
which is generally when the number of sensors is in a range between very few (0 or 1) and
a saturation amount (so many that the marginal benefit of any one sensor is minimal). Our
method for accounting for sensors, “extended reach”, also provides a workable method for
optimizing models that consider moving guards and moving sensors. This could be used
for UAVs employed in tandem with patrols, or for other search and interdict pairings.
8.2
Towards Implementation
The emphasis of this work was the decision support portion of a border interdiction tool.
A decision support tool is a system that uses mathematical models to provide assistance
to the people conducting planning. The intent is to create a framework that can provide
recommended decisions along with decision analysis tools to help a planning staff make
decisions and understand the implications of the decisions that they make. The goal is not
to automate the process and remove the human element from the planning staff. Rather, it
is to augment the planning staff’s own knowledge and understanding of the situation with
additional, useful information.
8.2.1
Operational Implementation
The initial results from our models are promising, and indicate that a border interdiction
support tool can be created that is useful for operational units. However, for it to be worthwhile to invest more resources into developing this tool, a number of additional steps need
to be taken. To ensure that the conceptual model of the formulations used here are valid,
further research should explore different geographic settings by expanding this work to
different network types of network topologies. For example, this conceptual validation
process could include topologies reflecting open desert with sparse, hard-packed roads and
more isolated mountain valleys. Once this analysis was conducted, and the results confirmed for other types of terrain, then the concept of the system would be confirmed as
widely applicable, and additional development steps could be taken.
130
Name
Model Description
Need
R-DSP
Robust Determine
Sensor Placement MIP
“Determine Sensor
Placements” to enable sensor
detections into patrol
scheduling decisions while
considering uncertainty in
the enemy flows.
DSP
Determine Sensor
Placement MIP
“Determine Sensor
Placements” to enable sensor
detections into patrol
scheduling decisions.
E-PS
Enhanced Patrol
Scheduling MIP
“Patrol Scheduling” function
that accounts for the presence
of sensors
B-PS
Basic Patrol
Scheduling MIP
DR
Dynamic Retasking
Algorithm
“Patrol Scheduling” in the
absence of sensors. Used for
border interdiction
scheduling when there are no
ground sensors.
“Dynamic Retasking”
function to enable a real-time
guard response to sensor
detections
Frequency of
Implementation
Would be used on
an infrequent basis
with an
approximation of
the guard forces
available over the
next month in order
to get results for the
best sensor
locations.
Would be used on
an infrequent basis
with an
approximation of
the guard forces
available over the
next month in order
to get results for the
best sensor
locations.
Guard locations
over time (after
sensors are
emplaced)
Would be used on
almost daily basis
for scheduling
patrols 2-3 days in
the future.
Would be available
for use all the time
with the algorithm
triggered by a
sensor detection.
Table 8.1.1: Model Comparison: A table summarizing the different models that we presented in this thesis, sorted in terms of tractability from largest to smallest. Analogous
robust versions for E-PS and B-PS follow directly from our development of the R-DSP
model.
131
Once the concept is validated for a wide variety of terrains, the border interdiction tool
needs an interface with existing intelligence systems that enables it to get input data and
to provide useful data outputs. The inputs to the model could come from a some of the
existing GIS software in use by the army. The modifications needed would be the ability
to output a network structure based on roads and trails, along with the associated distances.
Most of the software already includes a layer feature where users can build a road overlay,
along with distances from the coordinate systems in the software. For other inputs, the
interface could take direct inputs from the user , with friendly forces input information
could come directly from the planning staff based on the capabilities of the units involved.
The most difficult of the inputs to model would be the initial estimates of the enemy flows.
We believe that a combination of ISR data and intelligence reports could yield good starting points that could then be adjusted by the planning staff based on any additional understanding of the situation. This adjustment could also include the weighting of various
enemy units, origin sources, and destinations as more or less important based on the mission at hand. These adjustments represent a quantification of judgments already made by
the planning staff.
In addition to the inputs, a successful implementation of the model would require a system
for implementing the “Analysis of Sensor Data” function. Intelligence software exists that
can combine reports and create a single visualization with all of the known intelligence
on an area: human, electronic, imagery, and others. This system would need to take the
combined data and synthesize it into a single estimate of enemy traffic. This system would
also allow for a more structured process in gathering initial intelligence since part of the
unit’s initial ISR requests could be based on providing information to this system.
The system implementation for the functions described here would not occur on the same
frequency. A realistic example could be that a set of ground sensors are emplaced every
month, but the patrol schedule is generated every two days based on updated friendly forces
in the area. This frequent implementation of the patrol scheduling function allows for the
incorporation of learning about the enemy without a drastically more complex formulation. Since any updates from the sensor data can be incorporated into the revised flows
for the next patrol scheduling, a realistic implementation includes the ability to account
for learning about the enemy. Additionally, the frequency of scheduling also allows for a
simple adjustment to account for reasonably randomizing where the patrols go. If a unit is
concerned about not repeating security patrols in the same area, they can add an additional
constraint to the scheduling formulation to account for it, or add a feature that decreases
the estimated enemy flows for any paths that have been recently patrolled. This ensures
that the friendly forces do not always go to the same locations.
132
8.2.2
Adopting a Decision Support Tool
The adoption of a tactical-level decision support tool in the operational army would involve
a number of hurdles. Most immediately, many commanders could have the impression that
any support tool that provides tactical options is something that limits their independence
and autonomy. The point of a decision support tool is to enable a planning staff, but without good examples and and an education initiative on how it is best implemented, many
commanders will have a first impression of something that is encroaching on their decision
making. The goal of educating people on its use is to convince them that a decision support
tool is not designed to automate the planning process. It is designed to assist, and it can
do that by synthesizing data, presenting options, and providing a means to compare staffgenerated plans. In this tool, we specifically do not attempt to include a measure of risk
since a commander ultimately must decide on when to execute a mission. Additionally, the
tool does not provide a complete allocation of a commander’s forces. It provides options
within a specific mission set; it can provide a measure of the marginal impact of additional
resources applied to border interdiction, but does not measure the impact of those forces
leaving a different mission.
Related to this, an automated tool of this type presents opportunities where a friendly
force’s higher headquarters has access to the same decision support recommendations. This
could create a scenario where the opportunity for micro-management from a physically removed and less involved headquarters is higher. These scenarios occur even without automated recommended actions, but the possibilities are greater once a decision support tool
is utilized. The flip side of this concern is that planning staffs might become too dependent and perhaps even lazy, and not consider their own understanding of a situation and
the additional factors involved when tasking tactical units. An active education initiative
on the best use for a decision support tool along with commanders who stay attuned to the
delegation of responsibilities will be needed to limit this influence.
One of the most difficult aspects to influence when adopting the use of a decision support
tool is the user’s risk aversion and willingness to deviate from the recommendations. It is
crucial that staffs who come to different conclusions than the decision support tool feel free
to implement them. A model cannot capture every aspect of a situation, and if an involved
staff brings other factors into consideration that change their understanding of the situation,
then they should not feel bound to recommendation.
To increase the likelihood of widespread adoption for this type of tool, the formal model
building process would require additional legitimacy from the involvement of operating
133
forces. The involvement of a major combatant command (such as Africa Command or
Central Command) with real-world data would add legitimacy to the model development
process for future commanders, and increase the credibility of the model because of its
development with training data from a real-world mission. This data would also provide
the only reasonable avenue for model validation.
8.3
Future Work
In addition to the further development of this work into an implementable decision support
tool, there are a number of related applications that could be avenues for expanding this
work. The models developed here could be extended for use in a perimeter security setting
for a large installation or area. In a military context, this extension could serve as a framework for understanding how to allocate security patrols for logistics areas, resupply lines
or large formations mobilizing for further operations. For large logistic support areas, there
are generally only a few security units available, and these formulations could provide an
approach for scheduling security patrols. For resupply lines leading from a logistics hub to
a larger military formation or base, the formulation could be adapted for understanding how
to schedule security up and down this critical corridor. Additionally, the same techniques
for a logistics support area could apply to securing and prevent enemy reconnaissance of a
large formation mobilizing for follow-on operations.
The work synchronizing the emplacement of ground sensors with mobile patrols could be
easily extended to incorporate sensors that move each time step, similar to the employment
of the guards. This could give insights into the best ways of employing mobile sensors
(UAVs) with patrols to enhance overall interdiction. Further work in this area could also
give insights into when it is useful to task small UAVs to directly support ground patrols
for security.
This aerial extension could also lend insight into developing a formulation for determine
intelligence collection priorities for external ISR assets. This extension could prioritize
subsets of nodes for further collection as a Named Area of Interest for additional ISR
platforms, and the objective function could hinge on the ability to reduce uncertainty in the
system or assist in analyzing the already provided sensor data.
Other applications from network interdiction models could also be studied under this framework. These include a different version of interdicting supply lines based on varying the
representation of enemy movements and destinations. The functional decomposition and
134
combinations of analyzing sensor data with allocating scarce patrols could also apply to
interdicting drug trafficking or human smuggling across a region similarly modeled as a
network, which is one application are for network interdiction models.
135
136
Appendix A
Abbreviations and Acronyms
AO
B-PS
DR
DSP
E-PS
E-UGS
HMMWV
HQ
IED
ISR
MIP
PED
R-DSP
UAV
UGS
US
Area of Operations
Basic Patrol Scheduling Model
Dynamic Retasking Model
Determine Sensor Placement Model
Enhanced Patrol Scheduling Model
Expendable Unattended Ground Sensors
High Mobility Multipurpose Vehicle
Headquarters
Improvised Explosive Device
Intelligence, Surveillance, Reconnaissance
Mixed Integer Program
Processing, Exploitation and Dissemination
Robust Determine Sensor Placement Model
Unmanned Aerial Vehicle
Unattended Ground Sensors
United States
137
138
Bibliography
ARA, 2014. Expendable unattended ground sensors.
URL http://forcepro.ara.com/products/force-protection/
Beckhusen, R., 2013. Homeland security delays plan to place sensors on us-mexico border.
URL http://www.wired.com/dangerroom/2013/02/border-sensors/
Ben-Tal, A., Nemirovski, A., 1998. A robust convex optimization. Mathematics of Operations Research 23 (4), 769–805.
Ben-Tal, A., Nemirovski, A., 2000. Robust solutions of linear programming problems contaminated with uncertain data. Mathematical Programming 88, 411–424.
Berman, O., Bertsimas, D., Larson, R., 1995. Locating discretionary service facilities, ii:
Maximizing market size, minimizing inconvenience. Operations Research 43 (4), 623–
632.
Berman, O., Larson, R., Fouska, N., 1992. Optimal location of discretionary service facilities. Transportation Science 26 (3), 201–211.
Bertsimas, D., Brown, D., Caramanis, C., 2011. Theory and applications of robust optimization. Society for Industrial and Applied Mathematics Review 53 (3), 464–501.
Bertsimas, D., Sim, M., 2004. The price of robustness. Operations Research 52 (1), 35–53.
Bessman, D., September 2010. Optimal interdiction of an adaptive smuggler. Master’s thesis, Naval Postgraduate School.
Bryant, C., June 2006. Robust planning for effects based operations. Ph.D. thesis, MIT.
Culver, D., June 2013. Robust reconnaissance asset planning under uncertainty. Master’s
thesis, MIT.
139
Ghaoui, L. E., Oustry, F., Lebret, H., 1998. Robust solutions to uncertain semidefinite
programs. Society for Industrial and Applied Mathematics Journal on Optimization 9,
33–52.
Haider, E., December 1998. Unattended ground sensors and precision engagement. Master’s thesis, NPS.
Hodgson, M. J., 1990. A flow-capturing location-allocation model. Geographic Analysis
22 (3), 270–279.
Israeli, E., Wood, K., 2002. Shortest-path network interdiction. Networks 2, 97–111.
Keefe, R., Sullivan, T., 2011. Resource-constrained spacial hotspot identification. RAND
National Security Research Division.
Lamm, L., Lamm, G., Driscoll, P., 2002. Networked unattended ground sensor fields:
Tradeoff study and configuration rules methodology. USMA Operations Research Center
of Excellence (DSE-TR-02-10).
McQ-Inc., 2013. Omnisense.
URL http://www.mcqinc.com/products/omnisense.php
Ordonez, K., March 2006. Modeling the u.s. border patrol tucson sector for the deployment
and operations of border security forces. Master’s thesis, NPS.
Pan, F., Charlton, W., Morton, D., 2003. A stochastic program for interdicting smuggled
nuclear material. Operations Research/Computer Science Interfaces Series 22, 1–19.
Pandey, M., 2012. ’tiny spies’ to secure indo-pakistan border.
URL http://www.dailymail.co.uk/indiahome/indianews/article-2187116
Patrascu, A., April 2007. Optimizing distributed sensor placement for border patrol interdiction using microsoft excel. Master’s thesis, Air Force Institute of Technology.
Pulat, H., June 2005. A two-sided optimization of border patrol interdiction. Master’s thesis, Naval Postgraduate School.
Rozen, N., December 2009. Sensor interceptor operational policy optimization for maritime interdiction missions. Master’s thesis, NPS.
Sakamoto, P., June 2006. Uav mission planning under uncertainty. Master’s thesis, MIT.
Shactman, N., 2012. This rock could spy on your for decades.
URL http://www.wired.com/dangerroom/2012/05/spy-rock/
140
Soyster, A., 1973. A convex programming approach with set-inclusive constraints and applications to inexact linear programming. Operations Research 21, 1154–1157.
Szechtman, R., Kress, M., Lin, K., Cfir, D., 2007. Models of sensor operations for border
surveillance. Naval Research Logistics 55 (1), 27–41.
Washburn, A., Wood, K., 1994. Two-person zero-sum games for network interdiction. Operations Research 43 (2), 243–251.
Wollmer, R., 1964. Removing arcs from a network. Operations Research 12 (6), 934–940.
Wood, K., 1993. Deterministic network interdiction. Mathematical and Computer Modeling 17 (2), 1–18.
Wood, K., 2010. Bilevel network interdiction models: Formulations and solutions. In:
Cochran, J. J. (Ed.), Wiley Encyclopedia of Operations Research and Management Science. John Wiley and Sons, Inc.
Yildiz, B., June 2009. Exploration of the use of unmanned aerial vehicles along with other
assets to enhance border protection. Master’s thesis, NPS.
141
Download