Social Simulations for Border Security

EADS North America and George Mason University have partnered to build analytical tools for border security that incorporate social, cultural, behavioral and organizational aspects of interactions among border security forces, smugglers and the population and represent integrated technology architectures made up of fixed and mobile sensor and surveillance networks. These tools provide critical capabilities that influence border security operations, planning, analysis and training. We present the results of the first sprint of our effort, demonstrating the feasibility of social simulation for the security of the Southwestern U.S. border. First, we recount how we used open-source data on border security forces and smuggling organizations, replicating for 2009 the landscape of gateway organizations and cartels in Sonora along with the border security architecture for the Tuscon sector of Customs and Border Patrol (CBP). We then describe the architecture of the model that connects a disaggregated view of these organizations to a high-fidelity representation of the physical environment and sensor networks. Finally, we conclude with a short discussion of model dynamics, validity and generalizability of our approach.

[1]  Steven C Bankes,et al.  Tools and techniques for developing policies for complex and uncertain systems , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[2]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[3]  Robert L. Axtell,et al.  WHY AGENTS? ON THE VARIED MOTIVATIONS FOR AGENT COMPUTING IN THE SOCIAL SCIENCES , 2000 .

[4]  Karina J. Ordonez,et al.  Modeling the U.S. border patrol Tucson sector for the deployment and operations of border security forces , 2006 .

[5]  Zeug Gunter,et al.  Border Permeability Modelling: Technical Specifications at Global and Local Scale , 2007 .

[6]  Bahri Yildiz Exploration of the use of unmanned aerial vehicles along with other assets to enhance border protection , 2009 .

[7]  Gnana Bharathy,et al.  Validating agent based social systems models , 2010, Proceedings of the 2010 Winter Simulation Conference.

[8]  D. Rossmo,et al.  Geographic Patterns and Profiling of Illegal Crossings of the Southern U.S. Border , 2008 .

[9]  Tony Payan,et al.  The Three U.S.-Mexico Border Wars: Drugs, Immigration, and Homeland Security , 2006 .

[10]  Sean Luke,et al.  MASON: A Multiagent Simulation Environment , 2005, Simul..

[11]  Maciej M. Latek,et al.  Robust Decision Making under Strategic Uncertainty in Multiagent Environments , 2011, Applied Adversarial Reasoning and Risk Modeling.

[12]  K. Schlegel Transnational Crime , 2000 .

[13]  Maciej M. Latek,et al.  How Corruption Blunts Counternarcotic Policies in Afghanistan: A Multiagent Investigation , 2011, SBP.

[14]  Milind Tambe,et al.  A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? , 2010, Informatica.

[15]  P. Reuter,et al.  Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction , 1988 .

[16]  Maciej M Latek,et al.  Optimal Blends of History and Intelligence for Robust Antiterrorism Policy , 2011 .

[17]  Ernest H. Page,et al.  A Case Study of the Development and use of a MANA-Based Federation for Studying U.S. Border Operations , 2006, Proceedings of the 2006 Winter Simulation Conference.

[18]  Ian F. Akyildiz,et al.  BorderSense: Border patrol through advanced wireless sensor networks , 2011, Ad Hoc Networks.

[19]  J. Townshend,et al.  Global land cover classi(cid:142) cation at 1 km spatial resolution using a classi(cid:142) cation tree approach , 2004 .